Automated reverse engineering of role-based access control policies of web applications
Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy spe...
Saved in:
Main Authors: | LE, Ha Thanh, SHAR, Lwin Khin, BIANCULLI, Domenico, BRIAND, Lionel C., NGUYEN, Cu Duy |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6407 https://ink.library.smu.edu.sg/context/sis_research/article/7410/viewcontent/main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by: Thome, Julian, et al.
Published: (2021) -
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by: THOME, Julian, et al.
Published: (2018) -
Enforcing access control over data streams
by: Carminati, B., et al.
Published: (2013) -
Secure access control in unix
by: HEMAL NAMDEV RATHOD
Published: (2010) -
Access control protocols with two-layer architecture for wireless networks
by: Wan, Z., et al.
Published: (2013)