메뉴 건너뛰기




Volumn , Issue , 2007, Pages 201-210

Formal verification of business workflows and role based access control systems

Author keywords

[No Author keywords available]

Indexed keywords

BUSINESS WORKFLOWS; COMBINED MODELING; FORMAL VERIFICATIONS; INTERNATIONAL CONFERENCES; MODEL CHECKERS; ROLE-BASED ACCESS CONTROL; SECURITY PROPERTIES; STATE EXPLOSIONS;

EID: 47949104986     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECUREWARE.2007.4385334     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 1
    • 47949117591 scopus 로고    scopus 로고
    • Model Checking Access Control in Business Workflow
    • Technical Report CRIM-06/10-11, CRIM, Montreal, November
    • A. Dury, S. Boroday, A. Petrenko, V. Lotz, Model Checking Access Control in Business Workflow, Technical Report CRIM-06/10-11, CRIM, Montreal, November 2006.
    • (2006)
    • Dury, A.1    Boroday, S.2    Petrenko, A.3    Lotz, V.4
  • 4
    • 35248881970 scopus 로고    scopus 로고
    • Visual specifications of policies and their verification, Workshop on Fundamental Approaches to Software Engineering
    • M. Koch, F. Parisi-Presicce, "Visual specifications of policies and their verification", Workshop on Fundamental Approaches to Software Engineering, LNCS 2621, 2003.
    • (2003) LNCS , vol.2621
    • Koch, M.1    Parisi-Presicce, F.2
  • 6
    • 47949114635 scopus 로고    scopus 로고
    • J. Zao, H. Wee. J .Chu, D. Jackson, RBAC schema verification using lightweight formal model and constraint analysis, ACM Symposium on Access Control Models and Technologies, 2003.
    • J. Zao, H. Wee. J .Chu, D. Jackson, "RBAC schema verification using lightweight formal model and constraint analysis", ACM Symposium on Access Control Models and Technologies, 2003.
  • 8
    • 33244455252 scopus 로고    scopus 로고
    • Automated verification of access control policies
    • Technical Report 2004-22, University of California, Santa Barbara
    • G. Hughes, T. Bultan, Automated verification of access control policies, Technical Report 2004-22, University of California, Santa Barbara, 2004.
    • (2004)
    • Hughes, G.1    Bultan, T.2
  • 11
    • 24644445703 scopus 로고    scopus 로고
    • Conformance checking of RBAC policy and its implementation
    • The First Information Security Practice and Experience Conference
    • F. Hansen, V. Oleshchuk, "Conformance checking of RBAC policy and its implementation", The First Information Security Practice and Experience Conference, LNCS 3439, 2005.
    • (2005) LNCS , vol.3439
    • Hansen, F.1    Oleshchuk, V.2
  • 12
    • 35248838889 scopus 로고    scopus 로고
    • Formal security policy verification of distributed component-structured software
    • 23rd IFIP Intl. Conf. on Formal Techniques for Networked and Distributed Systems
    • P. Herrmann, "Formal security policy verification of distributed component-structured software", 23rd IFIP Intl. Conf. on Formal Techniques for Networked and Distributed Systems, LNCS 2767, 2003.
    • (2003) LNCS , vol.2767
    • Herrmann, P.1
  • 13
    • 24344447997 scopus 로고    scopus 로고
    • Typed static analysis for concurrent policy-based resource access control
    • Unpublished draft
    • N. Nguyen, J. Rathke, "Typed static analysis for concurrent policy-based resource access control", Unpublished draft, http://www.cogs.susx.ac.uk/users/julianr/pubs/dist-access.html, 2005.
    • (2005)
    • Nguyen, N.1    Rathke, J.2
  • 15
    • 47949129131 scopus 로고    scopus 로고
    • Woflan tool (on-line) http://is.tm.tue.nl/research/woflan/
    • Woflan tool (on-line) http://is.tm.tue.nl/research/woflan/
  • 18
    • 47949091355 scopus 로고    scopus 로고
    • WSAT Tool
    • WSAT Tool: http://www.cs.ucsb.edu/~su/WSAT/
  • 24
    • 47949124117 scopus 로고    scopus 로고
    • S. Jha, N. Li, M. Tripunitara, Q. Wang, W. Winsborough, Security analysis and administrative insider threat assessment in role-based access control, CERIAS Tech Report 2005-77, Center for Education and Research in Information Assurance and Security, Purdue University, 2005.
    • S. Jha, N. Li, M. Tripunitara, Q. Wang, W. Winsborough, Security analysis and administrative insider threat assessment in role-based access control, CERIAS Tech Report 2005-77, Center for Education and Research in Information Assurance and Security, Purdue University, 2005.
  • 26
    • 0043159688 scopus 로고
    • Temporal and Modal Logic, In Handbook of Theoretical Computer Science
    • Elsevier
    • E.A. Emerson, Temporal and Modal Logic, In Handbook of Theoretical Computer Science, Volume B: Formal Models and Semantics, Elsevier, 1990.
    • (1990) Formal Models and Semantics , vol.B
    • Emerson, E.A.1
  • 29
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • J. Bacon, K. Moody, W. Yao, "A model of OASIS role-based access control and its support for active security":, ACM Trans. Inf. Syst. Secur., 2002.
    • (2002) ACM Trans. Inf. Syst. Secur
    • Bacon, J.1    Moody, K.2    Yao, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.