메뉴 건너뛰기




Volumn 21, Issue 1, 2011, Pages 103-127

Model checking for verification of mandatory access control models and properties

Author keywords

Access control; model; policy; testing

Indexed keywords

AUTOMATED GENERATION; CONTROL PROPERTIES; COVERING ARRAYS; GENERAL APPROACH; MAC MODELS; MANDATORY ACCESS CONTROL; MODEL CHECKER; PROPERTY VERIFICATION; SECURITY PROPERTIES; SYSTEM IMPLEMENTATION; TEST CASE; WIDE GAP;

EID: 79960042343     PISSN: 02181940     EISSN: None     Source Type: Journal    
DOI: 10.1142/S021819401100513X     Document Type: Conference Paper
Times cited : (35)

References (37)
  • 7
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • DOI 10.1109/32.824414
    • E. C. Lupu and M. Sloman, Conflict in policy-based distributed systems management, IEEE Trans Software Engineering 25(6) (1999) 852-869. (Pubitemid 30583219)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 13
    • 0005314068 scopus 로고
    • National Computer Security Center Technical Report 79-91, Library, No. S237 September
    • National Computer Security Center, Integrity in Automated information System, Technical Report 79-91, Library No. S237,254, September 1991.
    • (1991) Integrity in Automated Information System , vol.254
  • 15
    • 0003479190 scopus 로고    scopus 로고
    • Workflow Management Coalition documentation number WFMC-TC-1011, February
    • Workflow Management Coalition, Workflow Management Coalition Terminology & Glossary, documentation number WFMC-TC-1011, February 1999. http://www. wfmc.org/.
    • (1999) Workflow Management Coalition Terminology & Glossary
  • 17
    • 0022706656 scopus 로고
    • Automatic verification of finite-state concurrent systems using temporal-logic specifications
    • E. M. Clarke, E. A. Emerson and A. P. Sistla, Automatic verification of finite-state concurrent systems using temporal-logic specifications, ACM Trans. Program ming Languages and Systems 8(2) (1986).
    • (1986) ACM Trans. Program Ming Languages and Systems , vol.8 , Issue.2
    • Clarke, E.M.1    Emerson, E.A.2    Sistla, A.P.3
  • 18
    • 0002670049 scopus 로고
    • A temporal logic for concurrent programs
    • A. Pnueli, A temporal logic for concurrent programs, T heoretical Computer Science 13 (1980).
    • (1980) T Heoretical Computer Science , vol.13
    • Pnueli, A.1
  • 21
    • 35348900179 scopus 로고    scopus 로고
    • A fault model and mutation testing of access control policies
    • DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
    • E. Martin and T. Xie, A fault model and mutation testing of access control policies, in Proc. 16th International Conference on World Wide Web, Banff, Alberta, Canada (2007), pp. 667-676. (Pubitemid 47582296)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 667-676
    • Martin, E.1    Xie, T.2
  • 24
    • 79960036338 scopus 로고    scopus 로고
    • http://csrc/nist/gov/acts.
  • 27
    • 33645964601 scopus 로고    scopus 로고
    • Evaluating access control policies through model checking, in Proc
    • N. Zhang, M. D. Ryan and D. Guelev, Evaluating access control policies through model checking, in Proc. Information Security Conference (2005), pp. 446-460.
    • (2005) Information Security Conference , pp. 446-460
    • Zhang, N.1    Ryan, M.D.2    Guelev, D.3
  • 28
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
    • A. Schaad, V. Lotz and K. Sohr, A model-checking approach to analysing organisational controls in a loan origination process, in Proc. ACM Symposium on Access Control Models and Technologies (2006), pp. 139-149. (Pubitemid 44300751)
    • (2006) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , vol.2006 , pp. 139-149
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 30
    • 35348900179 scopus 로고    scopus 로고
    • A fault model and mutation testing of access control policies
    • DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
    • E. Martin and T. Xie, A fault model and mutation testing of access control policies, in Proc. 11th International Conference on World Wide Web (WWW 2007), Security, Privacy, Reliability, and Ethics Track, Banff, Alberta, Canada (May 2007), pp. 667-676. (Pubitemid 47582296)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 667-676
    • Martin, E.1    Xie, T.2
  • 36
    • 79960034697 scopus 로고    scopus 로고
    • IBM Policy Manager V7.0: http://www.redbooks.ibm.com/redpapers/pdfs/ redp4512. pdf.
    • IBM Policy Manager V7.0
  • 37
    • 79960064148 scopus 로고    scopus 로고
    • Cisco Policy Manager
    • Cisco Policy Manager: http://www.cisco.com/en/US/products/ps9530/index. html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.