A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Discovery and Resolution of Anomalies in Web Access Control Policies
2013
IEEE Transactions on Dependable and Secure Computing
Emerging computing technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing Web access control policies are often error-prone due to the lack
doi:10.1109/tdsc.2013.18
fatcat:6fiicqdwwzdv3gd55zg5elpofi