Finding logical vulnerability in policies using three-level semantic framework
We present the continuation of our work on a three-level framework, which can be used to model and analyze the identification-authentication-authorization policies. Finding the gaps in such policies is challenging. We explore the cases when operations become accessible to the user because of flawed...
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
Springer
2024
|
Subjects: | |
Online Access: | https://repository.londonmet.ac.uk/9282/1/AIAI_Final_v2.pdf |