ACM Symposium on Applied Computing, Pisa, Italy,
April 4-8, 2016, pages 1641–1647.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Mar-
tinelli, F., and Mori, P. (2014b). Testing of polpa-
based usage control systems. Software Quality Jour-
nal, 22(2):241–271.
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., and
Schilders, L. (2013). Automated testing of extensible
access control markup language-based access control
systems. IET Software, 7(4):203–212.
Bertolino, A., Traon, L., Lonetti, F., Marchetti, E., and
Mouelhi, T. (2014c). Validation of access control sys-
tems. In Engineering Secure Future Internet Services
and Systems - Current Research, pages 210–233.
Cai, F., Zhu, N., He, J., Mu, P., Li, W., and Yu, Y. (2018).
Survey of access control models and technologies for
cloud computing. Cluster Computing, pages 1–12.
Calabr
`
o, A., Lonetti, F., and Marchetti, E. (2018). Monito-
ring of access control policy for refinement and impro-
vements. In Proc. of Software Quality: Methods and
Tools for Better Software and Systems, pages 17–36.
Hu, V. C., Kuhn, D. R., Xie, T., and Hwang, J. (2011).
Model checking for verification of mandatory access
control models and properties. International Journal
of Software Engineering and Knowledge Engineering,
21(01):103–127.
Hwang, J., Xie, T., Hu, V., and Altunay, M. (2010). Acpt:
A tool for modeling and verifying access control poli-
cies. In Proc. of International Symposium on Policies
for Distributed Systems and Networks, pages 40–43.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A unified
attribute-based access control model covering dac,
mac and rbac. In IFIP Annual Conference on Data
and Applications Security and Privacy, pages 41–55.
Lonetti, F. and Marchetti, E. (2018). On-line tracing of
XACML-based policycoverage criteria. IET Software.
Ma, Z., Yang, Y., and Wang, Y. (2015). A security po-
licy description language for distributed policy self-
management.
Margheri, A., Masi, M., Pugliese, R., and Tiezzi, F. (2017).
A rigorous framework for specification, analysis and
enforcement of access control policies. IEEE Tran-
sactions on Software Engineering.
Martinelli, F. and Matteucci, I. (2011). Preserving security
properties under refinement. In Proceedings of the 7th
International Workshop on Software Engineering for
Secure Systems, SESS ’11, pages 15–21.
OASIS (2005). eXtensible Access Control Markup
Language (XACML) Version 2.0. http://docs.oasis-
open.org/xacml/2.0/access
control-xacml-2.0-core-
spec-os.pdf.
Park, J. and Sandhu, R. (2002). Towards usage control mo-
dels: beyond traditional access control. In Proc. of
the seventh ACM symposium on Access control mo-
dels and technologies, pages 57–64. ACM.
Rensink, A. and Gorrieri, R. (2001). Vertical implementa-
tion. Information and Computation, 170(1):95 – 133.
Sharma, P. K., Kaushik, P. S., Agarwal, P., Jain, P., Agarwal,
S., and Dixit, K. (2017). Issues and challenges of data
security in a cloud computing environment. In Proc.
of 8th Annual Conference on Ubiquitous Computing,
Electronics and Mobile Communication, pages 560–
566.
Suhendra, V. (2011). A survey on access control de-
ployment. In International Conference on Security
Technology, pages 11–20. Springer.
Tianyi, Z., Weidong, L., and Jiaxing, S. (2011). An efficient
role based access control system for cloud computing.
In 11th International Conference on Computer and In-
formation Technology, pages 97–102.
Tsai, W.-T. and Shao, Q. (2011). Role-based access-control
using reference ontology in clouds. In Proc. of 10th
International Symposium on Autonomous Decentrali-
zed Systems, pages 121–128.
Ubale Swapnaja, A., Modani Dattatray, G., and Apte Su-
labha, S. (2014). Analysis of DAC MAC RBAC
Access Control based Models for Security. Internati-
onal Journal of Computer Applications, 104(5):6–13.
Veloudis, S., Paraskakis, I., Petsos, C., Verginadis, Y., Pa-
tiniotakis, I., and Mentzas, G. (2017). An ontologi-
cal template for context expressions in attribute-based
access control policies. In Proc. of the 7th Interna-
tional Conference on Cloud Computing and Services
Science, pages 151–162.
Veloudis, S., Verginadis, Y., Patiniotakis, I., Paraskakis,
I., and Mentzas, G. (2016). Context-aware security
models for paas-enabled access control. In Proc. of
the 6th International Conference on Cloud Computing
and Services Science, pages 202–212.
Wang, W., Han, J., Song, M., and Wang, X. (2011). The de-
sign of a trust and role based access control model in
cloud computing. In Proc. of 6th International Confe-
rence on Pervasive Computing and Applications, pa-
ges 330–334.
Weimer, D. L. and Vining, A. R. (2017). Policy analysis:
Concepts and practice. Taylor & Francis.
Youniand Kifayat, K. and Merabti, M. (2014). An access
control model for cloud computing. Journal of Infor-
mation Security and Applications, 19(1):45–60.
WEBIST 2018 - 14th International Conference on Web Information Systems and Technologies
268