References

  1. Microsoft Corporation: TLA+ Tools. Available at http://research.microsoft.com/en-us/um/people/lamport/tla/tools.html. (visited on February 2018).
  2. Antonios Gouglidis, Ioannis Mavridis & Vincent C. Hu (2014): Security policy verification for multi-domains in cloud systems. Int. J. Inf. Sec. 13(2), pp. 97–111, doi:10.1007/s10207-013-0205-x.
  3. Christos Grompanopoulos, Antonios Gouglidis & Ioannis Mavridis (2012): A Use-Based Approach for Enhancing UCON. In: Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 81–96, doi:10.1007/978-3-642-38004-4_6.
  4. Vincent C Hu, Rick Kuhn & Dylan Yaga (2017): Verification and Test Methods for Access Control Policies/Models. NIST Special Publication 800-192, doi:10.6028/NIST.SP.800-192.
  5. Leslie Lamport (2002): Specifying Systems, The TLA+ Language and Tools for Hardware and Software Engineers. Addison-Wesley.
  6. Aliaksandr Lazouski, Fabio Martinelli & Paolo Mori (2010): Usage control in computer security: A survey. Computer Science Review 4(2), pp. 81–99, doi:10.1016/j.cosrev.2010.02.002.
  7. Anastasia Mavridou, Emmanouela Stachtiari, Simon Bliudze, Anton Ivanov, Panagiotis Katsaros & Joseph Sifakis (2016): Architecture-Based Design: A Satellite On-Board Software Case Study. In: Formal Aspects of Component Software - 13th International Conference, FACS 2016, Besançon, France, October 19-21, 2016, Revised Selected Papers, pp. 260–279, doi:10.1007/978-3-319-57666-4_16.
  8. Jaehong Park & Ravi S. Sandhu (2004): The UCON_\voidb@x ABC usage control model. ACM Trans. Inf. Syst. Secur. 7(1), pp. 128–174, doi:10.1145/984334.984339.
  9. Najah Ben Said, Takoua Abdellatif, Saddek Bensalem & Marius Bozga (2014): Model-Driven Information Flow Security for Component-Based Systems. In: From Programs to Systems. The Systems perspective in Computing - ETAPS Workshop, FPS 2014, in Honor of Joseph Sifakis, Grenoble, France, April 6, 2014. Proceedings, pp. 1–20, doi:10.1007/978-3-642-54848-2_1.
  10. Xinwen Zhang, Masayuki Nakae, Michael J. Covington & Ravi S. Sandhu (2008): Toward a Usage-Based Security Framework for Collaborative Computing Systems. ACM Trans. Inf. Syst. Secur. 11(1), pp. 3:1–3:36, doi:10.1145/1330295.1330298.
  11. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce & Ravi S. Sandhu (2004): A logical specification for usage control. In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 1–10, doi:10.1145/990036.990038.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org