Refactoring access control policies for performance improvement
ICPE '12 Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering
A model-based approach to automated testing of access control policies
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Selection of regression system tests for security policy evolution
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering
Model-driven adaptive delegation
Proceedings of the 12th annual international conference on Aspect-oriented software development
A finite transition model for security protocol verification
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent compo-nent, called the Policy Decision Point (PDP). The execution of functions in the business logic should thus include calls to the PDP, which grants or denies the access to the protected resources/functionalities of the system, depending on the way the PDP has been con-figured.