Verification and change-impact analysis of access-control policies.
Kathi FislerShriram KrishnamurthiLeo A. MeyerovichMichael Carl TschantzPublished in: ICSE (2005)
Keyphrases
- access control policies
- change impact analysis
- access control
- conflict resolution
- root cause analysis
- source code
- access control systems
- security policies
- distributed environment
- fine grained
- software maintenance
- impact analysis
- security mechanisms
- software architecture
- trust negotiation
- automated trust negotiation
- open source
- information systems
- sensitive data
- resource constrained
- software systems
- distributed systems
- object oriented
- high level
- artificial intelligence
- databases