A comment on the `basic security theorem' of Bell and LaPadula
Information Processing Letters
Communications of the ACM
Efficient netlist comparison using hierarchy and randomization
DAC '85 Proceedings of the 22nd ACM/IEEE Design Automation Conference
The ITC distributed file system: principles and design
Proceedings of the tenth ACM symposium on Operating systems principles
ACM SIGOPS Operating Systems Review
On statecharts with overlapping
ACM Transactions on Software Engineering and Methodology (TOSEM)
Drawing graphs nicely using simulated annealing
ACM Transactions on Graphics (TOG)
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Towards A Role-Based Framework for DistributedSystems Management
Journal of Network and Systems Management
Visual Authorization Modeling in E-commerce Applications
IEEE MultiMedia
A Policy Based Role Object Model
EDOC '97 Proceedings of the 1st International Conference on Enterprise Distributed Object Computing
A formal specification of a visual language editor
IWSSD '91 Proceedings of the 6th international workshop on Software specification and design
A model-based approach to integrating security policies for embedded devices
Proceedings of the 4th ACM international conference on Embedded software
A formalism for visual security protocol modeling
Journal of Visual Languages and Computing
A system for visual role-based policy modelling
Journal of Visual Languages and Computing
Vulnerabilities detection in the configurations of MS windows operating system
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Hi-index | 0.00 |
Miro is a set of languages and tools that support the visual specification of file system security. Two visual languages are presented: the instance language, which allows specification of file system access, and the constraint language, which allows specification of security policies. Miro visual languages and tools are used to specify security configurations. A visual language is one whose entities are graphical, such as boxes and arrows, specifying means stating independently of any implementation the desired properties of a system. Security means file system protection: ensuring that files are protected from unauthorized access and granting privileges to some users, but not others. Tools implemented and examples of how these languages can be applied to real security specification problems are described.