A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control Policies.
Faouzi JaïdiFaten Labbene AyachiPublished in: CISIS-ICEUTE (2015)
Keyphrases
- access control policies
- formal language
- access control
- conflict resolution
- access control systems
- trusted computing
- distributed environment
- security policies
- extended logic programs
- fine grained
- trust negotiation
- access control models
- security mechanisms
- model checking
- data security
- role based access control
- artificial intelligence
- security requirements
- network security
- information systems
- security issues
- social networks
- database