Security policy compliance with violation management
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
Preservation of obligations in a temporal and deontic framework
Proceedings of the 6th international joint conference on Autonomous agents and multiagent systems
Deploying access control in distributed workflow
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
DEON '08 Proceedings of the 9th international conference on Deontic Logic in Computer Science
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
ADHOC-NOW '08 Proceedings of the 7th international conference on Ad-hoc, Mobile and Wireless Networks
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
DS-RT '08 Proceedings of the 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications
`What I Fail to Do Today, I Have to Do Tomorrow': A Logical Study of the Propagation of Obligations
Computational Logic in Multi-Agent Systems
Decision Procedures for a Deontic Logic Modeling Temporal Inheritance of Obligations
Electronic Notes in Theoretical Computer Science (ENTCS)
An Extended Role-Based Access Control Model for Delegating Obligations
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
Misbehaviors detection to ensure availability in OLSR
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
Formalization and management of group obligations
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Information and Software Technology
Formal enforcement and management of obligation policies
Data & Knowledge Engineering
Formal analysis of usage control policies
Proceedings of the 4th international conference on Security of information and networks
Test generation for network security rules
TestCom'06 Proceedings of the 18th IFIP TC6/WG6.1 international conference on Testing of Communicating Systems
Specifying and analysing run-time security policies for time dependant services
Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies
A state/event temporal deontic logic
DEON'06 Proceedings of the 8th international conference on Deontic Logic and Artificial Normative Systems
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations
International Journal of Mobile Computing and Multimedia Communications
Formal specification and management of security policies with collective group obligations
Journal of Computer Security
Hi-index | 0.00 |
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This approach is constructive, relying on properties of monads and monad transformers ...