{"id":"https://openalex.org/W2294098343","doi":"https://doi.org/10.5220/0005551000880099","title":"A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux","display_name":"A Uniform Modeling Pattern for Operating Systems Access Control Policies with an Application to SELinux","publication_year":2015,"publication_date":"2015-01-01","ids":{"openalex":"https://openalex.org/W2294098343","doi":"https://doi.org/10.5220/0005551000880099","mag":"2294098343"},"language":"en","primary_location":{"id":"doi:10.5220/0005551000880099","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005551000880099","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0005551000880099","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025996509","display_name":"Peter Amthor","orcid":"https://orcid.org/0000-0001-7711-4450"},"institutions":[{"id":"https://openalex.org/I119449181","display_name":"Technische Universit\u00e4t Ilmenau","ror":"https://ror.org/01weqhp73","country_code":"DE","type":"education","lineage":["https://openalex.org/I119449181"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Peter Amthor","raw_affiliation_strings":["Ilmenau University of Technology, Germany"],"affiliations":[{"raw_affiliation_string":"Ilmenau University of Technology, Germany","institution_ids":["https://openalex.org/I119449181"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5025996509"],"corresponding_institution_ids":["https://openalex.org/I119449181"],"apc_list":null,"apc_paid":null,"fwci":3.0739,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.93191449,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"88","last_page":"99"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9732000231742859,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7302560806274414},{"id":"https://openalex.org/keywords/mandatory-access-control","display_name":"Mandatory access control","score":0.6761806607246399},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5694549679756165},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.47321027517318726},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4213297665119171},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3417131304740906},{"id":"https://openalex.org/keywords/role-based-access-control","display_name":"Role-based access control","score":0.21351724863052368},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07904976606369019}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7302560806274414},{"id":"https://openalex.org/C2777407602","wikidata":"https://www.wikidata.org/wiki/Q1888932","display_name":"Mandatory access control","level":4,"score":0.6761806607246399},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5694549679756165},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.47321027517318726},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4213297665119171},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3417131304740906},{"id":"https://openalex.org/C45567728","wikidata":"https://www.wikidata.org/wiki/Q1702839","display_name":"Role-based access control","level":3,"score":0.21351724863052368},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07904976606369019}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.5220/0005551000880099","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005551000880099","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.5220/0005551000880099","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0005551000880099","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 12th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W190551272","https://openalex.org/W226482631","https://openalex.org/W1515933843","https://openalex.org/W1981058821","https://openalex.org/W1991895580","https://openalex.org/W1992435849","https://openalex.org/W1997080570","https://openalex.org/W1997167772","https://openalex.org/W2004592797","https://openalex.org/W2014609883","https://openalex.org/W2037008847","https://openalex.org/W2040234252","https://openalex.org/W2043835861","https://openalex.org/W2050379150","https://openalex.org/W2053343487","https://openalex.org/W2053741629","https://openalex.org/W2060690494","https://openalex.org/W2061161497","https://openalex.org/W2068210789","https://openalex.org/W2070199221","https://openalex.org/W2071717677","https://openalex.org/W2077448915","https://openalex.org/W2091768993","https://openalex.org/W2108441296","https://openalex.org/W2111753337","https://openalex.org/W2113448398","https://openalex.org/W2131778843","https://openalex.org/W2155166319","https://openalex.org/W2163952487","https://openalex.org/W2167911131","https://openalex.org/W2186960180","https://openalex.org/W2362831978","https://openalex.org/W2405120356","https://openalex.org/W2416759205","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2158881272","https://openalex.org/W2295582286","https://openalex.org/W2148952798","https://openalex.org/W2350594541","https://openalex.org/W1543439672","https://openalex.org/W2770657926","https://openalex.org/W2388818311","https://openalex.org/W2984218511","https://openalex.org/W2244657583","https://openalex.org/W400142400"],"abstract_inverted_index":{"Modern":[0],"operating":[1,118,135],"systems":[2,60],"increasingly":[3],"rely":[4],"on":[5,61,71],"enforcing":[6],"mandatory":[7],"access":[8,58],"control":[9,59],"through":[10],"the":[11,17,42,62,72,148,163],"use":[12],"of":[13,20,37,44,69,115,134,162],"security":[14,104,137],"policies.":[15,39,138],"Given":[16],"critical":[18],"property":[19],"policy":[21,105,157],"correctness":[22,70],"in":[23,122],"such":[24],"systems,":[25],"formal":[26,67],"methods":[27],"and":[28,35,52,65,107,132,151],"models":[29],"are":[30],"applied":[31],"for":[32,82,129],"both":[33],"specification":[34,131],"verification":[36],"these":[38],"Due":[40],"to":[41,95,103,147,155,159],"heterogeneity":[43],"their":[45],"respective":[46],"semantics,":[47],"this":[48,83,91,141],"is":[49],"an":[50,160],"intricate":[51],"error-prone":[53],"engineering":[54],"process.":[55],"However,":[56],"diverse":[57,66],"one":[63],"hand":[64,74],"criteria":[68],"other":[73],"have":[75],"so":[76],"far":[77],"impeded":[78],"a":[79,88,100,123],"unifying":[80],"framework":[81,128],"task.":[84],"This":[85,120],"paper":[86],"presents":[87],"step":[89],"towards":[90],"goal.":[92],"We":[93,139],"propose":[94],"leverage":[96],"core-based":[97],"model":[98],"engineering,":[99],"uniform":[101],"approach":[102],"formalization,":[106,130],"refine":[108],"it":[109],"by":[110,143],"adding":[111],"typical":[112],"semantic":[113],"abstractions":[114],"contemporary":[116],"policy-controlled":[117],"systems.":[119],"results":[121],"simple,":[124],"yet":[125],"highly":[126],"flexible":[127],"analysis":[133],"system":[136,150],"substantiate":[140],"claim":[142],"applying":[144],"our":[145],"method":[146],"SELinux":[149],"practically":[152],"demonstrate":[153],"how":[154],"map":[156],"semantics":[158],"instance":[161],"model.":[164]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2018,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
