메뉴 건너뛰기




Volumn 5, Issue 4, 2008, Pages 242-255

Toward formal verification of role-based access control policies

Author keywords

Access control; Computational complexity; Formal methods; RBAC

Indexed keywords

COMPUTATIONAL COMPLEXITY; FORMAL METHODS; FORMAL VERIFICATION; LOGIC PROGRAMMING; MODEL CHECKING; NETWORK SECURITY; POLYNOMIAL APPROXIMATION;

EID: 55949085989     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2007.70225     Document Type: Article
Times cited : (104)

References (44)
  • 1
    • 0026155356 scopus 로고
    • Safety Analysis for the Extended Schematic Protection Model
    • 91, pp, May
    • P. Ammann and R.S. Sandhu, "Safety Analysis for the Extended Schematic Protection Model," Proc. IEEE Symp. Security and Privacy (S&P '91), pp. 87-97, May 1991.
    • (1991) Proc. IEEE Symp. Security and Privacy (S&P , pp. 87-97
    • Ammann, P.1    Sandhu, R.S.2
  • 2
    • 38649084843 scopus 로고    scopus 로고
    • P. Ammann and R.S. Sandhu, Implementing Transaction Control Expressions by Checking for Absence of Access Rights, Proc. Eighth Ann. Computer Security Applications Conf. (ACSAC '92), Dec. 1992.
    • P. Ammann and R.S. Sandhu, "Implementing Transaction Control Expressions by Checking for Absence of Access Rights," Proc. Eighth Ann. Computer Security Applications Conf. (ACSAC '92), Dec. 1992.
  • 3
    • 55949092713 scopus 로고    scopus 로고
    • American National Standard for Information Technology, Role Based Access Control, Nat'l Standards Inst, Feb
    • American National Standard for Information Technology - Role Based Access Control, ANSI INCITS 359-2004, Am. Nat'l Standards Inst., Feb. 2004.
    • (2004) ANSI INCITS 359-2004, Am
  • 5
    • 26844544427 scopus 로고
    • Safety in Grammatical Protection Systems
    • T. Budd, "Safety in Grammatical Protection Systems," Int'l J. Computer and Information Sciences, vol. 12, no. 6, pp. 413-430, 1983.
    • (1983) Int'l J. Computer and Information Sciences , vol.12 , Issue.6 , pp. 413-430
    • Budd, T.1
  • 6
    • 0029695436 scopus 로고    scopus 로고
    • Tabled Evaluation with Delaying for General Logic Programs
    • Jan
    • W. Chen and D.S. Warren, "Tabled Evaluation with Delaying for General Logic Programs," J. ACM, vol. 43, no. 1, pp. 20-74, Jan. 1996.
    • (1996) J. ACM , vol.43 , Issue.1 , pp. 20-74
    • Chen, W.1    Warren, D.S.2
  • 8
    • 3142653715 scopus 로고    scopus 로고
    • Authorizations and Antichains,
    • PhD dissertation, Univ. of London, U.K
    • J. Crampton, "Authorizations and Antichains," PhD dissertation, Univ. of London, U.K., 2002.
    • (2002)
    • Crampton, J.1
  • 9
    • 3142510989 scopus 로고    scopus 로고
    • Administrative Scope: A Foundation for Role-Based Administrative Models
    • May
    • J. Crampton and G. Loizou, "Administrative Scope: A Foundation for Role-Based Administrative Models," ACM Trans. Information and System Security, vol. 6, no. 2, pp. 201-231, May 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 10
    • 0021509216 scopus 로고
    • Linear-Time Algorithms for Testing the Satisfiability of Propositional Horn Formulae
    • W.F. Dowling and J.H. Gallier, "Linear-Time Algorithms for Testing the Satisfiability of Propositional Horn Formulae," J. Logic Programming, vol. 1, no. 3, pp. 267-284, 1984.
    • (1984) J. Logic Programming , vol.1 , Issue.3 , pp. 267-284
    • Dowling, W.F.1    Gallier, J.H.2
  • 15
    • 55949109735 scopus 로고    scopus 로고
    • T.X.R. Group, The XSB Programming System, http://xsb.sourceforge. net/, 2008.
    • T.X.R. Group, The XSB Programming System, http://xsb.sourceforge. net/, 2008.
  • 16
    • 0009442659 scopus 로고
    • Monotonic Protection Systems
    • R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, eds, Academic Press, pp
    • M.A. Harrison and W.L. Ruzzo, "Monotonic Protection Systems," Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, eds., Academic Press, pp. 461-471, 1978.
    • (1978) Foundations of Secure Computation , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2
  • 17
    • 0016984825 scopus 로고
    • Protection in Operating Systems
    • Aug
    • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 25
    • 30544438141 scopus 로고    scopus 로고
    • N. Li, J.C. Mitchell, and W.H. Winsborough, Beyond Proof-of-Compliance: Security Analysis in Trust Management, J. ACM, 52, no. 3, pp. 474-514, A preliminary version appeared in Proc. 2003 IEEE Symp. Security and Privacy (S&P), May 2005.
    • N. Li, J.C. Mitchell, and W.H. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, no. 3, pp. 474-514, A preliminary version appeared in Proc. 2003 IEEE Symp. Security and Privacy (S&P), May 2005.
  • 26
    • 4143094794 scopus 로고    scopus 로고
    • N. Li and M.V. Tripunitara, Security Analysis in Role-Based Access Control, Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04), pp. 126-135, June 2004.
    • N. Li and M.V. Tripunitara, "Security Analysis in Role-Based Access Control," Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04), pp. 126-135, June 2004.
  • 30
    • 0033720107 scopus 로고    scopus 로고
    • Proc. 32nd Ann. ACM Symp. Theory of Computing (STOC '00)
    • extended abstract, pp, May
    • R. Motwani, R. Panigrahy, V.A. Saraswat, and S. Ventkatasubramanian, "On the Decidability of Accessibility Problems," Proc. 32nd Ann. ACM Symp. Theory of Computing (STOC '00), extended abstract, pp. 306-315, May 2000.
    • (2000) , pp. 306-315
    • Motwani, R.1    Panigrahy, R.2    Saraswat, V.A.3    Ventkatasubramanian, S.4
  • 35
    • 0023999796 scopus 로고
    • The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems
    • R.S. Sandhu, "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems," J. ACM, vol. 35, no. 2, pp. 404-432, 1988.
    • (1988) J. ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 37
    • 0033312487 scopus 로고    scopus 로고
    • Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation
    • R.S. Sandhu and V. Bhamidipati, "Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation," J. Computer Security, vol. 7, 1999.
    • (1999) J. Computer Security , vol.7
    • Sandhu, R.S.1    Bhamidipati, V.2
  • 39
  • 42
    • 3543115068 scopus 로고    scopus 로고
    • A Layered Design of Discretionary Access Controls with Decidable Safety Properties
    • May
    • J.A. Solworth and R.H. Sloan, "A Layered Design of Discretionary Access Controls with Decidable Safety Properties," Proc. IEEE Symp. Security and Privacy (S&P), May 2004.
    • (2004) Proc. IEEE Symp. Security and Privacy (S&P)
    • Solworth, J.A.1    Sloan, R.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.