Role-Based Access Control Models
Computer
Security in computing
Verification validation and accreditation of simulation models
Proceedings of the 29th conference on Winter simulation
Proceedings of the 30th conference on Winter simulation
Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Simulation Modeling Handbook: A Practical Approach
Simulation Modeling Handbook: A Practical Approach
An Introduction to the Web Services Policy Language (WSPL)
POLICY '04 Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Simulation Verification and Validation by Dynamic Policy Enforcement
ANSS '05 Proceedings of the 38th annual Symposium on Simulation
A Robust Testing Framework for Verifying Web Services by Completeness and Consistency Analysis
SOSE '05 Proceedings of the IEEE International Workshop
DDSOS: A Dynamic Distributed Service-Oriented Simulation Framework1
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
Towards a scalable and robust multi-tenancy SaaS
Proceedings of the Second Asia-Pacific Symposium on Internetware
Toward a target and coupling function of three different Information Security Management Systems
Concurrency and Computation: Practice & Experience
P4-simsaas: policy specification for Multi-Tendency simulation software-as-a-service model
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
This article presents a new verification and validation technique for simulation using dynamic policy specification and enforcement. Security requirements, certain functional requirements, and constraints can be formally specified as policies, and they are used to check at runtime whether the behaviors of the system under simulation are within the given constraints. A policy violation reveals a potential design error of the system under simulation. This article also presents the policy specification language and the policy development framework that are used to specify policies, to verify their completeness and consistency of policies, to translate them into executable representations, and to enforce them at runtime. The policy specification language and the policy development framework are fully integrated into the simulation infrastructure. An example is used throughout the article to illustrate the policy specification and enforcement processes. The article discusses different algorithms of policy enforcement and their space and time complexity.