메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 139-149

A model-checking approach to analysing organisational controls in a loan origination process

Author keywords

Delegation; Model checking; Organisational control; Revocation; Separation

Indexed keywords

CONSTRAINT THEORY; DATA FLOW ANALYSIS; DATA STRUCTURES; PUBLIC POLICY;

EID: 33748067444     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133058.1133079     Document Type: Conference Paper
Times cited : (85)

References (43)
  • 1
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Polcies, models and mechanisms
    • Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Editors
    • Samarati, P. and S. Vimercati, Access Control: Polcies, Models and Mechanisms, in Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Editors. 2001, Springer Lecture Notes 2171. p. 137-196.
    • (2001) Springer Lecture Notes , vol.2171 , pp. 137-196
    • Samarati, P.1    Vimercati, S.2
  • 9
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role-based environments
    • Rockport, Massachusetts
    • Simon, R. and M. Zurko. Separation of Duty in Role-Based Environments, in Computer Security Foundations Workshop X. 1997. Rockport, Massachusetts.
    • (1997) Computer Security Foundations Workshop X
    • Simon, R.1    Zurko, M.2
  • 10
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Ahn, G. and R. Sandhu, Role-based authorization constraints specification. Information and System Security Journal, 2000, 3(4): p. 207-226.
    • (2000) Information and System Security Journal , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.1    Sandhu, R.2
  • 11
    • 84894114949 scopus 로고    scopus 로고
    • An extended analysis of delegating obligations
    • Schaad, A. An Extended Analysis of Delegating Obligations. in IFIP DBSec 2004.
    • IFIP DBSec 2004
    • Schaad, A.1
  • 12
    • 33748032125 scopus 로고    scopus 로고
    • Revocation of obligation and authorisation policy objects
    • Schaad, A. Revocation of Obligation and Authorisation Policy Objects. in IFIP DBSec 2005. 2005.
    • (2005) IFIP DBSec 2005
    • Schaad, A.1
  • 13
    • 4243121778 scopus 로고    scopus 로고
    • Facilitating cross-organisational workflows with a workflow view approach
    • Schulz, K. and M. Orlowska, Facilitating cross-organisational workflows with a workflow view approach. Data Knowl. Eng., 2004. 51(1): p. 109-147.
    • (2004) Data Knowl. Eng. , vol.51 , Issue.1 , pp. 109-147
    • Schulz, K.1    Orlowska, M.2
  • 14
    • 84855343094 scopus 로고    scopus 로고
    • Delegation of tasks in workflow management systems
    • Ecole Polytechnique Fédérale de Lausanne (EPFL) Lausanne, Switzerland
    • Frossard, A., Delegation of Tasks in Workflow Management Systems, in School of Computer and Communication Sciences (IC). 2005, Ecole Polytechnique Fédérale de Lausanne (EPFL) Lausanne, Switzerland.
    • (2005) School of Computer and Communication Sciences (IC)
    • Frossard, A.1
  • 15
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Sandhu, R., et al., Role-based access control models. IEEE Computer, 1996, 29(2): p. 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1
  • 16
    • 0009233508 scopus 로고    scopus 로고
    • The ponder policy specification language, in policies for distributed systems and networks
    • Bristol
    • Damianou, N., et al. The Ponder Policy Specification Language, in Policies for Distributed Systems and Networks. 2001. Bristol: Springer Lecture Notes in Computer Science.
    • (2001) Springer Lecture Notes in Computer Science
    • Damianou, N.1
  • 19
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • Botha, Separation of duties for access control enforcement in workflow environments. IBM SYSTEMS JOURNAL, 2001. 40(3).
    • (2001) IBM Systems Journal , vol.40 , Issue.3
    • Botha1
  • 20
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Saltzer, J, and M. Schroeder. The protection of Information in Computer Systems. in IEEE. 1975.
    • (1975) IEEE
    • Saltzer, J.1    Schroeder, M.2
  • 21
    • 0023266943 scopus 로고
    • a Comparison of commercial and military security policies
    • Oakland, California
    • Clark, D. and D. Wilson. A Comparison of Commercial and Military Security Policies. in IEEE Symposium on Security and Privacy. 1987. Oakland, California.
    • (1987) IEEE Symposium on Security and Privacy
    • Clark, D.1    Wilson, D.2
  • 22
    • 0024125647 scopus 로고
    • Transaction control expressions for separation of duties
    • Arizona
    • Sandhu, R. Transaction Control Expressions for Separation of Duties. in 4th Aerospace Computer Security Conference. 1988. Arizona.
    • (1988) 4th Aerospace Computer Security Conference
    • Sandhu, R.1
  • 23
    • 0003342146 scopus 로고
    • Separation of duties in computerized information systems
    • Halifax, UK
    • Sandhu, R. Separation of Duties in Computerized Information Systems. in IFIP WG11.3 Workshop on Database Security. 1990. Halifax, UK.
    • (1990) IFIP WG11.3 Workshop on Database Security
    • Sandhu, R.1
  • 25
    • 0025028340 scopus 로고
    • Naming and grouping privileges to simplify security management in large databases
    • Oakland
    • Baldwin, R. Naming and Grouping Privileges to Simplify Security Management in Large Databases. in IEEE Symposium on Security and Privacy. 1990. Oakland.
    • (1990) IEEE Symposium on Security and Privacy
    • Baldwin, R.1
  • 26
    • 0031682433 scopus 로고    scopus 로고
    • On the formal definition of separation-of-duty policies and their composition
    • Oakland, CA
    • Gligor, V., S. Gavrila, and D. Ferraiolo. On the Formal Definition of Separation-of-Duty Policies and their Composition. in IEEE Symposium on Security and Privacy. 1998. Oakland, CA.
    • (1998) IEEE Symposium on Security and Privacy
    • Gligor, V.1    Gavrila, S.2    Ferraiolo, D.3
  • 28
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • Kuhn, R. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. in Proceedings of the second ACM workshop on Role-based access control. 1997.
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control
    • Kuhn, R.1
  • 31
    • 33748074855 scopus 로고
    • Delegation of authority using domain based access rules
    • Imperial College, University of London
    • Moffett, J.D., Delegation of Authority Using Domain Based Access Rules, in Dept of Computing. 1990, Imperial College, University of London.
    • (1990) Dept of Computing
    • Moffett, J.D.1
  • 34
    • 33748085080 scopus 로고    scopus 로고
    • Separation, review and supervision controls in the context of a credit application process: A case study of organisational control principles
    • Schaad, A. and J. Moffett. Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. in ACM SAC 2004.
    • ACM SAC 2004
    • Schaad, A.1    Moffett, J.2
  • 36
    • 84982075601 scopus 로고    scopus 로고
    • Towards usable and relevant model checking techniques for the analysis of dependable interactive systems
    • Loer, K. and M. Harrison. Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems. in ASE. 2002.
    • (2002) ASE
    • Loer, K.1    Harrison, M.2
  • 38
    • 33748066027 scopus 로고    scopus 로고
    • NuSMV2: An open source tool for symbolic model checking
    • Cimatti, A., et al. NuSMV2: an Open Source Tool for Symbolic Model Checking in QA075 Electronic computers. Computer Science http://eprints.biblio. unitn.it/archive/00000085. 2002.
    • (2002) QA075 Electronic Computers. Computer Science
    • Cimatti, A.1
  • 40
    • 0002470263 scopus 로고    scopus 로고
    • Symbolic model checking without BDDs
    • Biere, A., A. Cimatti, and Y. Zhu, eds. Springer LNCS
    • Biere, A., A. Cimatti, and Y. Zhu, eds. Symbolic model checking without BDDs. Tools and Algorithms for the construction and analysis of systems Vol. 1579. 1999, Springer LNCS.
    • (1999) Tools and Algorithms for the Construction and Analysis of Systems , vol.1579
  • 41
    • 84944044323 scopus 로고    scopus 로고
    • A temporal-logic extension of role-based access control covering dynamic separation of duties
    • Cairns, Queensland, Australia
    • Mossakowski, T., M. Drouineaud, and K. Sohr. A temporal-logic extension of role-based access control covering dynamic separation of duties. in TIME-ICTL. 2003. Cairns, Queensland, Australia.
    • (2003) TIME-ICTL
    • Mossakowski, T.1    Drouineaud, M.2    Sohr, K.3
  • 43
    • 33845388513 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking
    • Zhang, N., M. Ryan, and D. Guelev. Evaluating Access Control Policies Through Model Checking. in ISC. 2005.
    • (2005) ISC
    • Zhang, N.1    Ryan, M.2    Guelev, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.