메뉴 건너뛰기




Volumn 5430 LNCS, Issue , 2009, Pages 149-176

Security analysis of role based access control models using colored petri nets and CPNtools

Author keywords

Colored Petri Nets; CPNtools; RBAC; Security Formal Verification

Indexed keywords

COLORED PETRI NETS; CONTROL STRUCTURE; CPNTOOLS; DESIGN COMPLEXITY; FORMAL TECHNIQUES; GRAPHICAL REPRESENTATIONS; HIGH FLEXIBILITY; NET MODEL; RBAC; RBAC POLICY; ROLE HIERARCHY; ROLE-BASED ACCESS CONTROL MODEL; SECURITY ADMINISTRATOR; SECURITY ANALYSIS; SECURITY CONSTRAINT; SECURITY FORMAL VERIFICATION; SEPARATION OF DUTY;

EID: 67650308269     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01004-0_9     Document Type: Conference Paper
Times cited : (19)

References (49)
  • 1
    • 84964853055 scopus 로고    scopus 로고
    • Access Control: Policies, Models, and Mechanisms
    • Foundations of Security Analysis and Design
    • Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.2171, pp. 137-196. Springer, Heidelberg (2001) (Pubitemid 33364380)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2171 , pp. 137-196
    • Samarati, P.1    De Vimercati, S.D.C.2
  • 6
    • 27544484252 scopus 로고    scopus 로고
    • A Role-Based Access Control policy verification framework for real-time systems
    • Proceedings - 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2005
    • Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: WORDS 2005: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, pp. 13-20. IEEE Computer Society, Washington (2005), http://dx.doi.org/10.1109/WORDS.2005.11 (Pubitemid 41543712)
    • (2005) Proceedings - International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS , pp. 13-20
    • Shafiq, B.1    Masood, A.2    Joshi, J.3    Ghafoor, A.4
  • 7
    • 0004068620 scopus 로고
    • Ph.D. Thesis Institut Für Instrumentelle Mathematik Bonn
    • Petri, C.A.: Kommunikation mit automaten. Ph.D. thesis, Institut für instrumentelle Mathematik, Bonn (1962)
    • (1962) Kommunikation Mit Automaten
    • Petri, C.A.1
  • 9
    • 34547247707 scopus 로고    scopus 로고
    • Modeling Chinese Wall policy using colored petri nets
    • DOI 10.1109/CIT.2006.123, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
    • Zhang, Z.L., Hong, F., Liao, J.G.: Modeling chinese wall policy using colored petri nets. In: CIT 2006: Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, p. 162. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/CIT.2006.123 (Pubitemid 47145963)
    • (2006) Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006 , pp. 4019950
    • Zhang, Z.-L.1    Hong, F.2    Liao, J.-G.3
  • 10
    • 84944792110 scopus 로고    scopus 로고
    • TRBAC: A temporal role-based access control model
    • doi:10.1145/501978.501979
    • Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191-233 (2001), doi:10.1145/501978.501979
    • (2001) ACM Trans. Inf. Syst. Secur , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 11
    • 34548089388 scopus 로고    scopus 로고
    • Towards realizing a formal RBAC model in real systems
    • DOI 10.1145/1266840.1266875, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
    • Ahn, G.J., Hu, H.: Towards realizing a formal RBAC model in real systems. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 215-224. ACM, New York (2007), http://doi.acm.org/10. 1145/1266840.1266875 (Pubitemid 47287492)
    • (2007) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 215-224
    • Ahn, G.-J.1    Hu, H.2
  • 13
    • 0031611731 scopus 로고    scopus 로고
    • Formal specification for role based access control user/role and role/role relationship management
    • ACM, New York
    • Gavrila, S.I., Barkley, J.F.: Formal specification for role based access control user/role and role/role relationship management. In: RBAC 1998: Proceedings of the third ACM workshop on Role-based access control, pp. 81-90. ACM, New York (1998), http://doi.acm.org/10.1145/286884.286902
    • (1998) RBAC 1998 Proceedings of the Third ACM Workshop on Role-based Access Control , vol.1998 , pp. 81-90
    • Gavrila, S.I.1    Barkley, J.F.2
  • 14
    • 1542395657 scopus 로고    scopus 로고
    • Performance modeling and analysis of workflow
    • doi:10.1109/TSMCA.2003.819490
    • Li, J., Fan, Y., Zhou, M.: Performance modeling and analysis of workflow. IEEE Transactions on Systems, Man and Cybernetics, Part A 34(2), 229-242 (2004), doi:10.1109/TSMCA.2003.819490
    • (2004) IEEE Transactions on Systems Man and Cybernetics Part A , vol.34 , Issue.2 , pp. 229-242
    • Li, J.1    Fan, Y.2    Zhou, M.3
  • 16
    • 0002719897 scopus 로고    scopus 로고
    • The application of Petri nets to workflow management
    • Van Der Aalst, W.: The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers 8(1), 21-66 (1998) (Pubitemid 128540249)
    • (1998) Journal of Circuits, Systems and Computers , vol.8 , Issue.1 , pp. 21-66
    • Van Der Aalst, W.M.P.1
  • 18
  • 24
    • 40249115100 scopus 로고    scopus 로고
    • Verification of strict integrity policy via petri nets
    • DOI 10.1109/ICSNC.2006.76, Second International Conference on Systems and Networks Communications, ICSNC 2006
    • Zhang, Z.L., Hong, F., Xiao, H.J.: Verification of strict integrity policy via petri nets. In: ICSNC 2006: Proceedings of the International Conference on Systems and Networks Communication, p. 23. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/ICSNC.2006.76 (Pubitemid 351332958)
    • (2006) Second International Conference on Systems and Networks Communications, ICSNC 2006 , pp. 4041538
    • Zhang, Z.-L.1    Hong, F.2    Xiao, H.-J.3
  • 26
    • 0003400251 scopus 로고
    • Secure computer systems mathematical foundations
    • MITRE Corporation, Bedford
    • Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Tech. Rep. MTR-2547, MITRE Corporation, Bedford (1973)
    • (1973) Tech. Rep. MTR-2547
    • Bell, D.E.1    LaPadula, L.J.2
  • 27
    • 84874267738 scopus 로고
    • Predicate/transition nets
    • In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) LNCS. Springer, Heidelberg
    • Genrich, H.J.: Predicate/transition nets. In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) APN 1986. LNCS, vol.254, pp. 207-247. Springer, Heidelberg (1987)
    • (1987) APN 1986 , vol.254 , pp. 207-247
    • Genrich, H.J.1
  • 29
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corporation, Bedford
    • Biba, K.J.: Integrity considerations for secure computer systems. Tech. Rep. MTR- 3153, MITRE Corporation, Bedford (1977)
    • (1977) Tech. Rep. MTR- 3153
    • Biba, K.J.1
  • 30
    • 84949747356 scopus 로고    scopus 로고
    • An Authorization Model for Workflows
    • Atluri, V., kuang Huang, W.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.1146, pp. 44-64. Springer, Heidelberg (1996) (Pubitemid 126128893)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1146 , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 31
    • 12844263500 scopus 로고    scopus 로고
    • Modeling and analyzing of workflow authorization management
    • DOI 10.1007/s10922-004-0674-3
    • Yi, Z., Yong, Z., Weinong, W.: Modeling and analyzing of workflow authorization management. J. Netw. Syst. Manage. 12(4), 507-535 (2004), http://dx.doi.org/10.1007/s10922-004-0674-3 (Pubitemid 40168769)
    • (2004) Journal of Network and Systems Management , vol.12 , Issue.4 , pp. 507-535
    • Yi, Z.1    Yong, Z.2    Weinong, W.3
  • 32
    • 4444250230 scopus 로고    scopus 로고
    • Modular authorization and administration
    • Wedde, H.F., Lischka, M.: Modular authorization and administration. ACM Trans. Inf. Syst. Secur. 7(3), 363-391 (2004), http://doi.acm.org/10.1145/ 1015040.1015042
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.3 , pp. 363-391
    • WedDe, H.F.1    Lischka, M.2
  • 36
    • 14044273010 scopus 로고    scopus 로고
    • A first step towards formal verification of security policy properties for RBAC
    • Proceedings - Fourth International Conference on Quality Software, QSIC 2004
    • Drouineaud, M., Bortin, M., Torrini, P., Sohr, K.: A first step towards formal verification of security policy properties for RBAC. In: QSIC 2004: Proceedings of the Quality Software, Fourth International Conference, pp. 60-67. IEEE Computer Society, Washington (2004), http://dx.doi.org/10.1109/QSIC.2004.2 (Pubitemid 40276398)
    • (2004) Proceedings - Fourth International Conference on Quality Software, QSIC 2004 , pp. 60-67
    • Drouineaud, M.1    Bortin, M.2    Torrini, P.3    Sohr, K.4
  • 37
    • 33646406549 scopus 로고    scopus 로고
    • Representation and reasoning on RBAC: A description logic approach
    • In: Van Hung, D., Wirsing, M. (eds.) LNCS. Springer, Heidelberg
    • Zhao, C., Heilili, N., Liu, S., Lin, Z.: Representation and reasoning on RBAC: A description logic approach. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.3722, pp. 381-393. Springer, Heidelberg (2005)
    • (2005) ICTAC 2005 , vol.3722 , pp. 381-393
    • Zhao, C.1    Heilili, N.2    Liu, S.3    Lin, Z.4
  • 38
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A lightweight object modelling notation
    • DOI 10.1145/505145.505149
    • Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 11(2), 256-290 (2002), http://doi.acm.org/10.1145/505145. 505149 (Pubitemid 44159313)
    • (2002) ACM Transactions on Software Engineering and Methodology , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 40
    • 84957612105 scopus 로고    scopus 로고
    • Z/EVES version 1.5: An overview
    • In: Hutter, D., Traverso, P. (eds.) LNCS. Springer, Heidelberg
    • Canada, O.: Z/EVES version 1.5: An overview. In: Hutter, D., Traverso, P. (eds.) FM-Trends 1998. LNCS, vol.1641, pp. 367-376. Springer, Heidelberg (1999)
    • (1999) FM-Trends 1998 , vol.1641 , pp. 367-376
    • Canada, O.1
  • 41
    • 16244410402 scopus 로고    scopus 로고
    • HOL-Z 2.0: A proof environment for Z-specifications
    • Brucker, A.D., Rittinger, F., Wol, B., ludwigs-universitat Freiburg, A.: HOL-Z 2.0: A proof environment for Z-specifications. Journal of Universal Computer Science 9, 152-172 (2002) (Pubitemid 41151358)
    • (2003) Journal of Universal Computer Science , vol.9 , Issue.2 , pp. 152-172
    • Brucker, A.D.1    Ritthiger, F.2    Wolff, B.3
  • 43
    • 84955590178 scopus 로고    scopus 로고
    • Analyzing Separation of Duties in Petri Net Workflows
    • Information Assurance in Computer Networks Methods, Models and Architectures for Network Security
    • Knorr, K., Weidner, H.: Analyzing separation of duties in petri net workflows. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.2052, pp. 102-114. Springer, Heidelberg (2001) (Pubitemid 33275970)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2052 , pp. 102-114
    • Knorr, K.1    Weidner, H.2
  • 46
    • 0001940210 scopus 로고    scopus 로고
    • The role graph model and conflict of interest
    • Nyanchama, M., Osborn, S.: The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 2(1), 3-33 (1999), http://doi.acm.org/10.1145/ 300830.300832
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 3-33
    • Nyanchama, M.1    Osborn, S.2
  • 48
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461-471 (1976), http://doi.acm.org/10.1145/360303. 360333
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.