메뉴 건너뛰기




Volumn 5700 LNCS, Issue , 2009, Pages 21-42

Component-based security policy design with colored petri nets

Author keywords

Colored Petri net; Property preservation; Security policy; Specification and verification

Indexed keywords

COLORED PETRI NET; COLORED PETRI NETS; COMPONENT BASED; COMPOSITION OPERATORS; COMPUTER SECURITY; PROCESS ALGEBRAS; PROPERTY-PRESERVATION; PROPERTY-PRESERVING; SECURITY POLICY; SPECIFICATION AND VERIFICATION; THEORETICAL RESULT;

EID: 70350350373     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04164-8_3     Document Type: Conference Paper
Times cited : (3)

References (54)
  • 2
    • 33746684330 scopus 로고    scopus 로고
    • Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179-193 (2006)
    • Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179-193 (2006)
  • 3
    • 31844457357 scopus 로고    scopus 로고
    • Composing security policies with polymer
    • Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI, pp. 305-314 (2005)
    • (2005) PLDI , pp. 305-314
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 4
    • 70350387207 scopus 로고    scopus 로고
    • Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. Journal of Computer Security ii. 4(2/3), 229-263 (1996)
    • Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. Journal of Computer Security ii. 4(2/3), 229-263 (1996)
  • 5
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231-285 (1998)
    • (1998) ACM Trans. Database Syst , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 7
    • 57549084474 scopus 로고    scopus 로고
    • A rewriting framework for the composition of access control policies
    • Valencia. ACM Press, New York
    • Bertolissi, C., Fernández, M.: A rewriting framework for the composition of access control policies. In: Proceedings of PPDP 2008, Valencia. ACM Press, New York (2008)
    • (2008) Proceedings of PPDP
    • Bertolissi, C.1    Fernández, M.2
  • 8
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report TR-3153, Mitre, Bedford, MA
    • Biba, K.: Integrity considerations for secure computer systems. Technical Report TR-3153, Mitre, Bedford, MA (1975)
    • (1975)
    • Biba, K.1
  • 11
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the web
    • Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241-272 (2002)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 14
    • 51749123140 scopus 로고    scopus 로고
    • Access-control policies via belnap logic: Effective and efficient composition and analysis
    • IEEE Computer Society Press, Los Alamitos
    • Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: 21st IEEE Computer Security Foundations Symposium (CSF), pp. 163-176. IEEE Computer Society Press, Los Alamitos (2008)
    • (2008) 21st IEEE Computer Security Foundations Symposium (CSF) , pp. 163-176
    • Bruns, G.1    Huth, M.2
  • 15
    • 24644520728 scopus 로고    scopus 로고
    • Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, 2609, pp. 1-15. Springer, Heidelberg (2003)
    • Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1-15. Springer, Heidelberg (2003)
  • 18
    • 70350388059 scopus 로고    scopus 로고
    • Rewrite based specification of access control policies
    • Dougherty, D, Escobar, S, eds, Security and Rewriting Techniques, 3rd International Workshop SecRet, Elsevier, Amsterdam
    • Cirstea, H., Moreau, P., Santana de Oliveira, A.: Rewrite based specification of access control policies. In: Dougherty, D., Escobar, S. (eds.) Security and Rewriting Techniques, 3rd International Workshop SecRet 2008. Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2008)
    • (2008) Electronic Notes in Theoretical Computer Science
    • Cirstea, H.1    Moreau, P.2    Santana de Oliveira, A.3
  • 19
    • 28144457207 scopus 로고    scopus 로고
    • A security model with non-atomic actions and deadlines. In: CSFW
    • Los Alamitos
    • Cuppens, F., Cuppens-Boulahia, N., Sans, T.: A security model with non-atomic actions and deadlines. In: CSFW, pp. 186-196. IEEE Society, Los Alamitos (2005)
    • (2005) IEEE Society , pp. 186-196
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Sans, T.3
  • 22
    • 33749558954 scopus 로고    scopus 로고
    • Dougherty, DJ., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), 4130, pp. 632-646. Springer, Heidelberg (2006)
    • Dougherty, DJ., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol. 4130, pp. 632-646. Springer, Heidelberg (2006)
  • 23
    • 38049036409 scopus 로고    scopus 로고
    • Modular access control via strategic rewriting
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Dougherty, DJ., Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Modular access control via strategic rewriting. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 578-593. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 578-593
    • Dougherty, D.J.1    Kirchner, C.2    Kirchner, H.3    Santana de Oliveira, A.4
  • 25
    • 84942243858 scopus 로고    scopus 로고
    • Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 187-201 (2003)
    • Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 187-201 (2003)
  • 26
  • 28
    • 70350369274 scopus 로고    scopus 로고
    • Huang, HJ., Kirchner, H.: Modular security policy design based on extended Petri nets. Technical Report inria-00396924, INRIA (2009), http://hal.inria.fr/inria-000396924/fr/
    • Huang, HJ., Kirchner, H.: Modular security policy design based on extended Petri nets. Technical Report inria-00396924, INRIA (2009), http://hal.inria.fr/inria-000396924/fr/
  • 30
    • 33750686900 scopus 로고    scopus 로고
    • Jarvis, B., Jain, L.: Trust in LORA: Towards a formal definition of trust in BDI agents. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), 4252, pp. 458-463. Springer, Heidelberg (2006)
    • Jarvis, B., Jain, L.: Trust in LORA: Towards a formal definition of trust in BDI agents. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol. 4252, pp. 458-463. Springer, Heidelberg (2006)
  • 35
    • 77957782581 scopus 로고    scopus 로고
    • Analysis of rewrite-based access control policies
    • Dougherty, D, Escobar, S, eds, Security and Rewriting Techniques, 3rd International Workshop Secret, Elsevier, Amsterdam
    • Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Analysis of rewrite-based access control policies. In: Dougherty, D., Escobar, S. (eds.) Security and Rewriting Techniques, 3rd International Workshop Secret 2008, Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2008)
    • (2008) Electronic Notes in Theoretical Computer Science
    • Kirchner, C.1    Kirchner, H.2    Santana de Oliveira, A.3
  • 38
    • 34547271784 scopus 로고    scopus 로고
    • Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In: Winslett, M., Gordon, A.D., Sands, D. (eds.) FMSE, pp. 45-54. ACM Press, New York (2006)
    • Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In: Winslett, M., Gordon, A.D., Sands, D. (eds.) FMSE, pp. 45-54. ACM Press, New York (2006)
  • 39
    • 35248834606 scopus 로고    scopus 로고
    • Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: PADL, pp. 58-73 (2003)
    • Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: PADL, pp. 58-73 (2003)
  • 41
    • 84947263112 scopus 로고    scopus 로고
    • Automatic code generation method based on coloured Petri net models applied on an access control system
    • Nielsen, M, Simpson, D, eds, ICATPN 2000, Springer, Heidelberg
    • Mortensen, K.: Automatic code generation method based on coloured Petri net models applied on an access control system. In: Nielsen, M., Simpson, D. (eds.) ICATPN 2000. LNCS, vol. 1825, pp. 367-386. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1825 , pp. 367-386
    • Mortensen, K.1
  • 42
    • 70350379800 scopus 로고    scopus 로고
    • Moses, T, Extensible access control markup language (XACML) version 2.0. Technical report, OASIS February 2005
    • Moses, T.: Extensible access control markup language (XACML) version 2.0. Technical report, OASIS (February 2005)
  • 44
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis, and applications
    • Murata, T.: Petri nets: Properties, analysis, and applications. Proceedings of IEEE 77(4), 541-580 (1985)
    • (1985) Proceedings of IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 48
    • 70350420343 scopus 로고    scopus 로고
    • Stehr, M.-O., Meseguer, J., Olveczky, P.C.: Rewriting logic as a unifying framework for Petri nets. In: Ehrig, H., Juhás, G., Padberg, J., Rozenberg, G. (eds.) APN 2001. LNCS, 2128, pp. 250-303. Springer, Heidelberg (2001)
    • Stehr, M.-O., Meseguer, J., Olveczky, P.C.: Rewriting logic as a unifying framework for Petri nets. In: Ehrig, H., Juhás, G., Padberg, J., Rozenberg, G. (eds.) APN 2001. LNCS, vol. 2128, pp. 250-303. Springer, Heidelberg (2001)
  • 49
    • 70350363750 scopus 로고    scopus 로고
    • Tiplea, F., Jucan, T., Masalagiu, C.: Term rewriting systems and Petri nets. Analele Stiintifice ale Universitatii Al. I. Cuza 34(4), 305-317 (1988)
    • Tiplea, F., Jucan, T., Masalagiu, C.: Term rewriting systems and Petri nets. Analele Stiintifice ale Universitatii Al. I. Cuza 34(4), 305-317 (1988)
  • 50
    • 33748055425 scopus 로고    scopus 로고
    • Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: Ferraiolo, D.R., Ray, I. (eds.) SACMAT, pp. 160-169. ACM Press, New York (2006)
    • Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: Ferraiolo, D.R., Ray, I. (eds.) SACMAT, pp. 160-169. ACM Press, New York (2006)
  • 51
    • 0035328989 scopus 로고    scopus 로고
    • Algorithms and reductions for rewriting problems
    • Verma, R., Rusinowitch, M., Lugiez, D.: Algorithms and reductions for rewriting problems. Fundamental Informatics 46(3), 257-276 (2001)
    • (2001) Fundamental Informatics , vol.46 , Issue.3 , pp. 257-276
    • Verma, R.1    Rusinowitch, M.2    Lugiez, D.3
  • 52
    • 3142523600 scopus 로고    scopus 로고
    • A propositional policy algebra for access control
    • Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2), 286-325 (2003)
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.2 , pp. 286-325
    • Wijesekera, D.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.