메뉴 건너뛰기




Volumn 16, Issue 1, 2008, Pages 1-61

Synthesising verified access control systems through model checking

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CONTROL SYSTEMS; INFORMATION ANALYSIS; MODEL CHECKING; USER INTERFACES;

EID: 37249072460     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2008-16101     Document Type: Article
Times cited : (40)

References (35)
  • 2
    • 0242709308 scopus 로고    scopus 로고
    • Static verification of security requirements in role based CSCW systems
    • Como, Italy, Jun
    • T. Ahmed and A.R. Tripathi, Static verification of security requirements in role based CSCW systems, in: SACMAT'03, Como, Italy, Jun 2003.
    • (2003) SACMAT'03
    • Ahmed, T.1    Tripathi, A.R.2
  • 4
    • 84949185739 scopus 로고    scopus 로고
    • Alternating-time temporal logic
    • Compositionality -The Significant Difference, Springer-Verlag
    • R. Alur, T.A. Henzinger and O. Kupferman, Alternating-time temporal logic, in: Compositionality -The Significant Difference, LNCS 1536, Springer-Verlag, 1999, pp. 23-60.
    • (1999) LNCS , vol.1536 , pp. 23-60
    • Alur, R.1    Henzinger, T.A.2    Kupferman, O.3
  • 5
    • 0035790651 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Chantilly, VA, USA, ACM Press
    • J. Bacon, K. Moody and W. Yao, A model of OASIS role-based access control and its support for active security, in: 6th ACM symposium on Access control models and technologies, Chantilly, VA, USA, ACM Press, 2001, pp. 171-181.
    • (2001) 6th ACM symposium on Access control models and technologies , pp. 171-181
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 9
    • 84958776545 scopus 로고
    • Optimal implementation of conjunctive queries in relational data bases
    • Boulder, CO, USA, ACM Press
    • A.K. Chandra and P.M. Merlin, Optimal implementation of conjunctive queries in relational data bases, in: 9th Annual ACM Symposium on Theory of Computing, Boulder, CO, USA, ACM Press, 1977, pp. 77-90.
    • (1977) 9th Annual ACM Symposium on Theory of Computing , pp. 77-90
    • Chandra, A.K.1    Merlin, P.M.2
  • 11
    • 4243189286 scopus 로고    scopus 로고
    • Counterexample guided abstraction refinement for symbolic model checking
    • E. Clarke, O. Grumberg, S. Jha, Y. Lu and H. Veith, Counterexample guided abstraction refinement for symbolic model checking, Journal of the ACM (JACM) 50 (2003), 752-794.
    • (2003) Journal of the ACM (JACM) , vol.50 , pp. 752-794
    • Clarke, E.1    Grumberg, O.2    Jha, S.3    Lu, Y.4    Veith, H.5
  • 14
    • 33244470893 scopus 로고    scopus 로고
    • Verification and change-impact analysis of access-control policies
    • St. Louis, Missouri, USA, May
    • K. Fisler, S. Krishnamurthi, L.A. Meyerovich and M.C. Tschantz, Verification and change-impact analysis of access-control policies, in: ICSE'05, St. Louis, Missouri, USA, May 2005.
    • (2005) ICSE'05
    • Fisler, K.1    Krishnamurthi, S.2    Meyerovich, L.A.3    Tschantz, M.C.4
  • 15
    • 85036962452 scopus 로고    scopus 로고
    • S. Godik and X Moses, extensible Access Control Markup Language, OASIS committee, 1.1 edition, Aug 2003, Committee specification.
    • S. Godik and X Moses, extensible Access Control Markup Language, OASIS committee, 1.1 edition, Aug 2003, Committee specification.
  • 16
    • 24644452174 scopus 로고    scopus 로고
    • Model-checking access control policies
    • 7th Information Security Conference ISC'04, Springer-Verlag
    • D.P. Guelev, M.D. Ryan, and P.-Y. Schobbens, Model-checking access control policies, in: 7th Information Security Conference (ISC'04), Lecture Notes in Computer Science, Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science
    • Guelev, D.P.1    Ryan, M.D.2    Schobbens, P.-Y.3
  • 23
    • 18744382646 scopus 로고    scopus 로고
    • Software Design Group, MIT Lab for Computer Science, Feb, This document and the tool can be obtained from
    • D. Jackson, Micromodels of Software: Lightweight Modelling and Analysis with Alloy, Software Design Group, MIT Lab for Computer Science, Feb 2002. This document and the tool can be obtained from http://alloy.mit.edu/
    • (2002) Micromodels of Software: Lightweight Modelling and Analysis with Alloy
    • Jackson, D.1
  • 24
    • 0003278892 scopus 로고
    • On the characterisation of law and computer systems: The normative systems perspective
    • J. Meyer and R. Wieringa, eds, Wiley
    • A. Jones and M. Sergot, On the characterisation of law and computer systems: The normative systems perspective, in: J. Meyer and R. Wieringa, eds, Deontic Logic in Computer Science. Normative system Specification, Wiley, 1993, pp. 275-307.
    • (1993) Deontic Logic in Computer Science. Normative system Specification , pp. 275-307
    • Jones, A.1    Sergot, M.2
  • 25
    • 0003581143 scopus 로고
    • PhD thesis, School of Computer Science, Carnegie Mellon University
    • K.L. McMillan, Symbolic model checking, PhD thesis, School of Computer Science, Carnegie Mellon University, 1993.
    • (1993) Symbolic model checking
    • McMillan, K.L.1
  • 29
    • 0242625217 scopus 로고    scopus 로고
    • A lightweight approach to specification and analysis of role-based access control extensions
    • Monterey, California, USA, Jun
    • A. Schaad and J. Moffett, A lightweight approach to specification and analysis of role-based access control extensions, in: SACMAT'02, Monterey, California, USA, Jun 2002.
    • (2002) SACMAT'02
    • Schaad, A.1    Moffett, J.2
  • 30
    • 85036978895 scopus 로고    scopus 로고
    • Aug, Information about Ulis implementation can be found at
    • Sun Microsystems, Sun's XACML implementation, Aug 2003. Information about Ulis implementation can be found at http://sunxacml.sourceforge.net/
    • (2003) Sun Microsystems, Sun's XACML implementation
  • 31
    • 33645977306 scopus 로고    scopus 로고
    • Information about Ulis implementation can be found at
    • J. Whaley, JavaBDD: Java BDD implementation, 2004. Information about Ulis implementation can be found at http://javabdd.sourceforge.net/
    • (2004) JavaBDD: Java BDD implementation
    • Whaley, J.1
  • 33
    • 85036970482 scopus 로고    scopus 로고
    • N. Zhang, AcPeg, the access control policy evaluator and generator, July 2006, The tool can. be obtained from www.cs.bham.ac.uk/~nxz or www.cs.bham.ac.uk/~mdr/research/projects/05-AccessControl
    • N. Zhang, AcPeg, the access control policy evaluator and generator, July 2006, The tool can. be obtained from www.cs.bham.ac.uk/~nxz or www.cs.bham.ac.uk/~mdr/research/projects/05-AccessControl
  • 35


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.