Ruiqi Luo

Learn More
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (AR-BAC) specifies how an RBAC policy may be changed by each administrator. Because sequences of changes by different administrators may interact in un-intended ways, it is often difficult to fully understand the effect of(More)
Role Based Access Control (RBAC) has been widely used for restricting resource access to only authorized users. Administrative Role Based Access Control (ARBAC) specifies permissions for administrators to change RBAC policies. Due to complex interactions between changes made by different administrators , it is often difficult to comprehend the full effect(More)
Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back the VM to a previous "good" state in order to recover from a VM crash or to undo a previous VM activity. Although VM checkpointing eases systems administration and improves usability, it can also increase the(More)
— Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Although RBAC provides flexible mechanisms to control the access to information, it does not control how the information propagates after it is obtained. Formally analyzing information flows resulting from an RBAC policy helps administrators understand the policy(More)
—Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies control who can access which provenance information. Correct specification of provenance access control(More)
  • 1