Works (6)
2012 journal article
First step towards automatic correction of firewall policy faults
ACM Transactions on Autonomous and Adaptive Systems, 7(2).
2012 conference paper
Selection of regression system tests for security policy evolution
2012 proceedings of the 27th ieee/acm international conference on automated software engineering (ase), 266–269.

2011 journal article
Designing Fast and Scalable XACML Policy Evaluation Engines
IEEE TRANSACTIONS ON COMPUTERS, 60(12), 1802–1817.
2011 journal article
MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 21(1), 103–127.
2009 article
Detection of Multiple-Duty-Related Security Leakage in Access Control Policies
2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, pp. 65–74.

2009 article
Fault Localization for Firewall Policies
2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.