Project Details
Description
We model Access Control Policies, mainly RBAC and policies expressed in XACML.
This model is used for automatic reasoning, and constructs attacks against faulty policies. Policies for Web sites can be sometimes extracted from their Java code,
or injected in their code.
This model is used for automatic reasoning, and constructs attacks against faulty policies. Policies for Web sites can be sometimes extracted from their Java code,
or injected in their code.
Acronym | Th-HTO |
---|---|
Status | Finished |
Effective start/end date | 20/11/07 → 1/10/11 |
Keywords
- Security
- Formal Specification
- Automated Verification
- Access Control
- Role-based Access Control (RBAC)
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.