Security Policies

Overview

Web Service Security Policies

Policy Recovery/Inference

Program Analysis for Security Policies

Mobile Security Testing and Analysis

Web Security Policies

Browser Security

Privacy Concerns/ Privacy Leakage Detection

Models/Protocol

Policies against attacks

Policy Analysis

Role Engineering (i.e., role mining)

Policy Composition

Policy Constraints/Features (e.g., Obligations, Separation of Duty)

Misc.

Performance

Authorization

Reasoning

Policy Comparison

Note: adds papers CCS 05-09 04/10/2010