메뉴 건너뛰기




Volumn 4318 LNCS, Issue , 2006, Pages 196-210

A verifiable formal specification for RBAC model with constraints of separation of duty

Author keywords

Formal specification; RBAC; Separation of duty; Verification

Indexed keywords

CONSTRAINT THEORY; FORMAL LANGUAGES; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33845944921     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11937807_16     Document Type: Conference Paper
Times cited : (16)

References (18)
  • 1
    • 0042023007 scopus 로고
    • Formal Methods: Use and Relevance for the Development of Safety Critical Systems
    • Barroca L.M., McDrmid J.A.: Formal Methods: Use and Relevance for the Development of Safety Critical Systems. The Computer Journal. 1992,35(6):579-599.
    • (1992) The Computer Journal , vol.35 , Issue.6 , pp. 579-599
    • Barroca, L.M.1    McDrmid, J.A.2
  • 2
    • 0000289556 scopus 로고    scopus 로고
    • Formal Methods: State of the Art and Future Directions
    • Clarke E., Wing J.: Formal Methods: State of the Art and Future Directions. ACM Computing Surveys,1996,28(4):626-643.
    • (1996) ACM Computing Surveys , vol.28 , Issue.4 , pp. 626-643
    • Clarke, E.1    Wing, J.2
  • 4
    • 33845962217 scopus 로고    scopus 로고
    • ANSI INCITS 359-2004. Role Based Access Control. American National Standard for Information Technology, 2004.
    • ANSI INCITS 359-2004. Role Based Access Control. American National Standard for Information Technology, 2004.
  • 6
    • 33845954122 scopus 로고    scopus 로고
    • RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis
    • December, Accessed June
    • Zao J., Wee Hochtech, Chu J., et al. RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis. MIT, December 2002. http://alloy.mit.edu/contributions/RBAC.pdf, Accessed June 2006.
    • (2002) MIT
    • Zao, J.1
  • 8
    • 14044273010 scopus 로고    scopus 로고
    • A First Step Towards Formal Verification of Security Policy Properties for RBAC. Proceedings of the Quality Software
    • Sep
    • Drouineaud M., Bortin M., Torrini P., and et al: A First Step Towards Formal Verification of Security Policy Properties for RBAC. Proceedings of the Quality Software, Fourth International Conference on (QSIC'04), 60-67, Sep. 2004
    • (2004) Fourth International Conference on (QSIC'04) , pp. 60-67
    • Drouineaud, M.1    Bortin, M.2    Torrini, P.3    and et, al.4
  • 10
    • 33646406549 scopus 로고    scopus 로고
    • Representation and Reasoning on RBAC: A Description Logic Approach
    • The International Colloquium on Theoretical Aspects of Computing ICTAC, Springer-Verlag
    • Zhao G., Heilili N., Liu S.P., et al: Representation and Reasoning on RBAC: A Description Logic Approach. The International Colloquium on Theoretical Aspects of Computing (ICTAC 2005), LNCS 3722, Springer-Verlag(2005)394-406.
    • (2005) LNCS , vol.3722 , pp. 394-406
    • Zhao, G.1    Heilili, N.2    Liu, S.P.3
  • 11
    • 33646129449 scopus 로고    scopus 로고
    • A Formal Description of SECIMOS Operating System
    • Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS, St. Petersburg, Russia
    • Zhou Z.Y., Liang B., Jiang L.: A Formal Description of SECIMOS Operating System. Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2005),St. Petersburg, Russia, LNCS. (2005)286-297
    • (2005) LNCS , pp. 286-297
    • Zhou, Z.Y.1    Liang, B.2    Jiang, L.3
  • 13
    • 33845916692 scopus 로고    scopus 로고
    • Accessed June 2006
    • ORA Canada Z/EVES. http://www.ora.on.ca/z-eves/, Accessed June 2006.
    • ORA Canada Z/EVES
  • 15
    • 0031346670 scopus 로고    scopus 로고
    • Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems
    • Fairfax, VA
    • Kuhn D. R. Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA.(1997)23-30
    • (1997) Proc. of the 2nd ACM Workshop on Role-Based Access Control , pp. 23-30
    • Kuhn, D.R.1
  • 16
    • 33845940327 scopus 로고    scopus 로고
    • Good D.I., Akers R.L., Smith L.M.: Report on Gypsy 2.05. Tech. Rept. ICSCA-CMP-48, the University of Texas at Austin.(1986)
    • Good D.I., Akers R.L., Smith L.M.: Report on Gypsy 2.05. Tech. Rept. ICSCA-CMP-48, the University of Texas at Austin.(1986)
  • 18
    • 16244410402 scopus 로고    scopus 로고
    • HOL-Z 2.0: A Proof Environment for Z-Specifications
    • Brucker A.D., Rittinger F., Wolff B.: HOL-Z 2.0: A Proof Environment for Z-Specifications. J. UCS, 2003,9(2):152-172.
    • (2003) J. UCS , vol.9 , Issue.2 , pp. 152-172
    • Brucker, A.D.1    Rittinger, F.2    Wolff, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.