英寸 发表于 2025-4-1 02:33:19

Verification of Security Policy Enforcement in Enterprise Systemsgin permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.

最有利 发表于 2025-4-1 09:50:04

http://reply.papertrans.cn/31/3083/308205/308205_62.png

夹死提手势 发表于 2025-4-1 13:41:51

Multimedia Document Systems in Perspectivesnditions, our axiomatic as well as inference rules. We also give a representative use case with our specification of recommendation requirements. Finally, we explain how our logical framework could be used to query the security policy and to check its consistency.
页: 1 2 3 4 5 6 [7]
查看完整版本: Titlebook: Emerging Challenges for Security, Privacy and Trust; 24th IFIP TC 11 Inte Dimitris Gritzalis,Javier Lopez Conference proceedings 2009 IFIP