英寸 发表于 2025-4-1 02:33:19
Verification of Security Policy Enforcement in Enterprise Systemsgin permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.最有利 发表于 2025-4-1 09:50:04
http://reply.papertrans.cn/31/3083/308205/308205_62.png夹死提手势 发表于 2025-4-1 13:41:51
Multimedia Document Systems in Perspectivesnditions, our axiomatic as well as inference rules. We also give a representative use case with our specification of recommendation requirements. Finally, we explain how our logical framework could be used to query the security policy and to check its consistency.