Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
Publications

Publications by CRACS

2015

Multithreaded Tabling for Logic Programming

Authors
Areias, M;

Publication

Abstract

2015

Introdução ao desenvolvimento de jogos em Android

Authors
Queirós, Ricardo; Simões, Alberto;

Publication

Abstract

2015

Proceedings Third International Workshop on Linearity, LINEARITY 2014, Vienna, Austria, 13th July, 2014

Authors
Alves, S; Cervesato, I;

Publication
LINEARITY

Abstract

2015

Access Control and Obligations in the Category-Based Metamodel: A Rewrite-Based Semantics

Authors
Alves, S; Degtyarev, A; Fernandez, M;

Publication
LOGIC-BASED PROGRAM SYNTHESIS AND TRANSFORMATION (LOPSTR 2014)

Abstract
We define an extension of the category-based access control (CBAC) metamodel to accommodate a general notion of obligation. Since most of the well-known access control models are instances of the CBAC metamodel, we obtain a framework for the study of the interaction between authorisation and obligation, such that properties may be proven of the metamodel that apply to all instances of it. In particular, the extended CBAC metamodel allows security administrators to check whether a policy combining authorisations and obligations is consistent.

2015

A short note on type-inhabitation: Formula-trees vs. game semantics

Authors
Alves, S; Broda, S;

Publication
INFORMATION PROCESSING LETTERS

Abstract
This short note compares two different methods for exploring type-inhabitation in the simply typed lambda-calculus, highlighting their similarities.

2015

A Framework for the Analysis of Access Control Policies with Emergency Management

Authors
Alves, S; Fernandez, M;

Publication
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE

Abstract
We define a framework for the analysis of access control policies that aims at easing the specification and verification tasks for security administrators. We consider policies in the category-based access control model, which has been shown to subsume many of the most well known access control models (e.g., MAC, DAC, RBAC). Using a graphical representation of category-based policies, we show how answers to usual administrator queries can be automatically computed, and properties of access control policies can be checked. We show applications in the context of emergency situations, where our framework can be used to analyse the interaction between access control and emergency management.

  • 107
  • 202