Role Hierarchies and Constraints for Lattice-Based Access Controls
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Verifiable Conformance Relationship between Smart Card Applets and B Security Models
ABZ '08 Proceedings of the 1st international conference on Abstract State Machines, B and Z
Hi-index | 0.00 |
Access Control is a technique which insures security by preserving confidentiality and integrity of information. Meca (Models for access control) is a tool which generates, in a B machine, operational conditions that should be verified by an application to insure security.