메뉴 건너뛰기




Volumn , Issue , 2009, Pages 13-22

Ensuring spatio-temporal access control for real-world applications

Author keywords

Alloy; Modeling; Spatio temporal RBAC; UML

Indexed keywords

ACCESS CONTROL MODELS; ACCESS DECISION; ALLOY ANALYZERS; AUTOMATED ANALYSIS; AUTOMATED TOOLS; CONTEXTUAL INFORMATION; DECISION SUPPORTS; ERROR PRONES; FIRST ORDER LOGIC; FORMAL SPECIFICATION; FORMAL SPECIFICATION LANGUAGE; MANUAL ANALYSIS; MODELING; REAL-WORLD APPLICATION; ROLE-BASED ACCESS CONTROL; SOFTWARE INDUSTRY; SOFTWARE INFRASTRUCTURE; SPATIO-TEMPORAL; UML MODEL;

EID: 70450235110     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1542207.1542212     Document Type: Conference Paper
Times cited : (34)

References (43)
  • 6
    • 33745594017 scopus 로고    scopus 로고
    • MDA and Analysis of Web Applications
    • Trends in Enterprise Application Architecture, of, Trondheim, Norway, August
    • Behzad Bordbar and Kyriakos Anastasakis. MDA and Analysis of Web Applications. In Trends in Enterprise Application Architecture, volume 3888 of Lecture notes in Computer Science, pages 44-55, Trondheim, Norway, August 2005.
    • (2005) Lecture notes in Computer Science , vol.3888 , pp. 44-55
    • Bordbar, B.1    Anastasakis, K.2
  • 12
    • 60849085437 scopus 로고    scopus 로고
    • G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb. An Aspect-oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue on Model-Driven Development for Secure Information Systems, 51(5):846-864, May 2009.
    • G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb. An Aspect-oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue on Model-Driven Development for Secure Information Systems, 51(5):846-864, May 2009.
  • 13
    • 70450252939 scopus 로고    scopus 로고
    • Geri Georg, James Bieman, and Robert B. France. Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study. In Andy Evans, Robert France, Ana Moreira, and Bernhard Rumpe, editors, Practical UML-Based Rigorous Development Methods - Countering or Integrating the eXtremists., P-7 of LNI, pages 128-141, 2001.
    • Geri Georg, James Bieman, and Robert B. France. Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study. In Andy Evans, Robert France, Ana Moreira, and Bernhard Rumpe, editors, Practical UML-Based Rigorous Development Methods - Countering or Integrating the eXtremists., volume P-7 of LNI, pages 128-141, 2001.
  • 25
    • 70450254074 scopus 로고    scopus 로고
    • OMG. OCL Version 2.0. Document id: formal/06-05-01
    • OMG. OCL Version 2.0. Document id: formal/06-05-01. http://www.omg.org.
  • 26
    • 70450240483 scopus 로고    scopus 로고
    • OMG. UML: Superstructure. Version 2.0. Document id: formal/05-07-04
    • OMG. UML: Superstructure. Version 2.0. Document id: formal/05-07-04. http://www.omg.org.
  • 27
    • 70450271609 scopus 로고    scopus 로고
    • OMG. Unified Modeling Language: Superstructure Version 2.1.2 Formal/07/11/02. At, 2002
    • OMG. Unified Modeling Language: Superstructure Version 2.1.2 Formal/07/11/02. At http://www.omg.org/docs/formal/07-11-02.pdf., 2002.
  • 28
    • 32444439291 scopus 로고    scopus 로고
    • Towards a Location-Based Mandatory Access Control Model
    • February
    • Indrakshi Ray and Mahendra Kumar. Towards a Location-Based Mandatory Access Control Model. Computers & Security, 25(1), February 2006.
    • (2006) Computers & Security , vol.25 , Issue.1
    • Ray, I.1    Kumar, M.2
  • 35
    • 50249147519 scopus 로고    scopus 로고
    • A Framework for Specification and Verification of Generalized Spatio-Temporal Role Based Access Control Model
    • Technical report, Purdue University, February, CERIAS TR 2007-08
    • Arjmand Samuel, Arif Ghafoor, and Elisa Bertino. A Framework for Specification and Verification of Generalized Spatio-Temporal Role Based Access Control Model. Technical report, Purdue University, February 2007. CERIAS TR 2007-08.
    • (2007)
    • Samuel, A.1    Ghafoor, A.2    Bertino, E.3
  • 37
    • 0242625217 scopus 로고    scopus 로고
    • A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
    • Monterey, CA, USA, June
    • Andreas Schaad and Jonathan D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, June 2002.
    • (2002) Proceedings of the 7th ACM Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2
  • 39
    • 35248816057 scopus 로고    scopus 로고
    • A lightweight formal analysis of a multicast key management scheme
    • Fo r m a l Techniques for Networked and Distributed Systems, FORTE 2003, of
    • Mana Taghdiri and Daniel Jackson. A lightweight formal analysis of a multicast key management scheme. In Fo r m a l Techniques for Networked and Distributed Systems - FORTE 2003, volume 2767 of Lecture Notes in Computer Science, pages 240-256, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2767 , pp. 240-256
    • Taghdiri, M.1    Jackson, D.2
  • 41
    • 69549108311 scopus 로고    scopus 로고
    • Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delegation
    • To appear
    • Manachai Toahchoodee and Indrakshi Ray. Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delegation. IET Information Security, 2009. To appear.
    • (2009) IET Information Security
    • Toahchoodee, M.1    Ray, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.