메뉴 건너뛰기




Volumn , Issue , 2011, Pages 734-739

Evaluating RBAC supported techniques and their validation and verification

Author keywords

Formal and semi formal techniques; RBAC; Survey and analysis; Verification and validation

Indexed keywords

ACCESS CONTROL MECHANISM; APPROPRIATE TECHNIQUES; AUTOMATED ANALYSIS; DEGREE OF COVERAGES; DYNAMIC ASPECTS; FORMAL AND SEMI-FORMAL TECHNIQUES; FORMAL TECHNIQUES; RBAC; ROLE HIERARCHY; ROLE-BASED ACCESS CONTROL; SECURITY RULES; SEPARATION OF DUTY; SPECIFICATION TECHNIQUE; SUPPORTING SYSTEMS; VALIDATION AND VERIFICATION; VERIFICATION AND VALIDATION;

EID: 80455173451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2011.112     Document Type: Conference Paper
Times cited : (9)

References (29)
  • 1
    • 0042266220 scopus 로고    scopus 로고
    • The best of both worlds integrating UML with z for software specifications
    • S. Martin, "The Best of Both Worlds Integrating UML with Z for Software Specifications," Journal of Computing and Control Engineering, vol. 14, pp. 8-11, (2003).
    • (2003) Journal of Computing and Control Engineering , vol.14 , pp. 8-11
    • Martin, S.1
  • 4
    • 36048931368 scopus 로고    scopus 로고
    • USE: A UML-based specification environment for validating UML and OCL
    • DOI 10.1016/j.scico.2007.01.013, PII S0167642307001608, Experimental Software and Toolkits
    • M. Gogolla, F. Büttner, and M. Richters, "USE: A UMLbased specification environment for validating UML and OCL," Sci. Comput. Program., vol. 69, no. 1-3, pp. 27-34, 2007. (Pubitemid 350087238)
    • (2007) Science of Computer Programming , vol.69 , Issue.1-3 , pp. 27-34
    • Gogolla, M.1    Buttner, F.2    Richters, M.3
  • 5
    • 80455136267 scopus 로고    scopus 로고
    • UML 2.0 OCL specification, OMG document
    • "Object Management Group, UML 2.0 OCL specification, OMG document available at http://www.omg.org/spec/ocl/2.0/," 2003.
    • (2003)
  • 7
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: From UML Models to Access Control Infrastructures," Proceedings of the ACM Transactions on Software Engineering and Methodology (TOSEM'06), vol. 15, no. 1, pp. 39-91, 2006. (Pubitemid 43947939)
    • (2006) ACM Transactions on Software Engineering and Methodology , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 10
    • 56649088001 scopus 로고    scopus 로고
    • Scenario-based static analysis of UML class models
    • LNCS
    • L. Yu, R. B. France, and I. Ray, "Scenario-based static analysis of UML class models," in MoDELS. LNCS, Vol. 5301, 2008, pp. 234-248.
    • (2008) MoDELS , vol.5301 , pp. 234-248
    • Yu, L.1    France, R.B.2    Ray, I.3
  • 11
    • 57349119890 scopus 로고    scopus 로고
    • Enabling verification and conformance testing for access control model
    • ACM Press
    • H. Hu and G.-J. Ahn, "Enabling verification and conformance testing for access control model," in SACMAT. ACM Press, 2008, pp. 195-204.
    • (2008) SACMAT. , pp. 195-204
    • Hu, H.1    Ahn, G.-J.2
  • 12
    • 0242625217 scopus 로고    scopus 로고
    • A lightweight approach to specification and analysis of role-based access control extensions
    • ACM Press
    • A. Schaad and J. D. Moffett, "A lightweight approach to specification and analysis of role-based access control extensions," in Proc. of 7th SACMAT. ACM Press, 2002, pp. 13-22.
    • (2002) Proc. of 7th SACMAT. , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2
  • 15
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A lightweight object modelling notation
    • DOI 10.1145/505145.505149
    • D. Jackson, "Alloy: A Lightweight Object Modelling Notation," ACM Trans. Softw. Eng. Methodol., vol. 11, no. 2, pp. 256-290, 2002. (Pubitemid 44159313)
    • (2002) ACM Transactions on Software Engineering and Methodology , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 18
    • 33646027053 scopus 로고    scopus 로고
    • Specification and validation of authorisation constraints using UML and OCL
    • ser. LNCS,. Springer
    • K. Sohr, G.-J. Ahn, M. Gogolla, and L. Migge, "Specification and validation of authorisation constraints using UML and OCL," in ESORICS'05, ser. LNCS, vol. 3679. Springer, 2005.
    • (2005) ESORICS'05 , vol.3679
    • Sohr, K.1    Ahn, G.-J.2    Gogolla, M.3    Migge, L.4
  • 20
    • 33751113935 scopus 로고    scopus 로고
    • Validating the enforcement of access control policies and separation of duty principle in requirement engineering
    • DOI 10.1016/j.infsof.2006.03.009, PII S0950584906000450
    • K. Alghathbar, "Validating the enforcement of access control policies and separation of duty principle in requirement engineering," Information & Software Technology, vol. 49, no. 2, pp. 142-157, 2007. (Pubitemid 44765201)
    • (2007) Information and Software Technology , vol.49 , Issue.2 , pp. 142-157
    • Alghathbar, K.1
  • 25
    • 0034586701 scopus 로고    scopus 로고
    • Some shortcomings of OCL, the object constraint language of UML
    • IEEE
    • M. Vaziri and D. Jackson, "Some shortcomings of OCL, the object constraint language of UML," in TOOLS (34). IEEE, 2000, pp. 555-562.
    • (2000) TOOLS (34) , pp. 555-562
    • Vaziri, M.1    Jackson, D.2
  • 26
  • 29
    • 80455177389 scopus 로고    scopus 로고
    • [Online]
    • "The Alloy Analyzer Quick Guide." [Online]. Available: http://alloy.mit.edu/alloy4/quickguide/index.html
    • The Alloy Analyzer Quick Guide


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.