Works (6)

Updated: July 5th, 2023 15:49

2012 journal article

First step towards automatic correction of firewall policy faults

ACM Transactions on Autonomous and Adaptive Systems, 7(2).

By: F. Chen, A. Liu, J. Hwang & T. Xie

Source: NC State University Libraries
Added: August 6, 2018

2012 conference paper

Selection of regression system tests for security policy evolution

2012 proceedings of the 27th ieee/acm international conference on automated software engineering (ase), 266–269.

By: J. Hwang n, T. Xie n, D. El Kateb*, T. Mouelhi* & Y. Le Traon*

Source: NC State University Libraries
Added: August 6, 2018

2011 journal article

Designing Fast and Scalable XACML Policy Evaluation Engines

IEEE TRANSACTIONS ON COMPUTERS, 60(12), 1802–1817.

By: A. Liu*, F. Chen*, J. Hwang n & T. Xie*

author keywords: Web servers; XACML; policy evaluation; policy-based computing; access control; policy decision point
Source: Web Of Science
Added: August 6, 2018

2011 journal article

MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES

INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 21(1), 103–127.

By: V. Hu*, D. Kuhn*, T. Xie n & J. Hwang n

author keywords: Access control; policy; model; testing
Source: Web Of Science
Added: August 6, 2018

2009 article

Detection of Multiple-Duty-Related Security Leakage in Access Control Policies

2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.

By: J. Hwang n, T. Xie n & V. Hu*

author keywords: Validation; Policy Verification; Access Control Policies
Source: Web Of Science
Added: August 6, 2018

2009 article

Fault Localization for Firewall Policies

2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.

By: J. Hwang n, T. Xie n, F. Chen* & A. Liu*

Source: Web Of Science
Added: August 6, 2018