Automated reverse engineering of role-based access control policies of web applications
Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy spe...
Saved in:
Main Authors: | LE, Ha Thanh, SHAR, Lwin Khin, BIANCULLI, Domenico, BRIAND, Lionel C., NGUYEN, Cu Duy |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2022
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/6407 https://ink.library.smu.edu.sg/context/sis_research/article/7410/viewcontent/main.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by: Thome, Julian, et al.
Published: (2021) -
An integrated approach for effective injection vulnerability analysis of web applications through security slicing and hybrid constraint solving
by: THOME, Julian, et al.
Published: (2018) -
Medium access control for dynamic spectrum access in cognitive radio networks : analysis under uncertainty
by: Dong, Qiumin, et al.
Published: (2013) -
Search-driven string constraint solving for vulnerability detection
by: THOME, Julian, et al.
Published: (2017) -
Enforcing access control over data streams
by: Carminati, B., et al.
Published: (2013)