메뉴 건너뛰기




Volumn , Issue , 2011, Pages 163-174

Automatic error finding in access-control policies

Author keywords

Security; Verification

Indexed keywords

ABSTRACTION-REFINEMENT; GRAPH DIAMETER; ORDERS OF MAGNITUDE; POLICY ANALYSIS; REFINEMENT STEP; ROLE-BASED ACCESS CONTROL; SECURITY; SECURITY POLICY; SECURITY PROPERTIES; STATE SPACE EXPLORATION;

EID: 80755168364     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2046707.2046727     Document Type: Conference Paper
Times cited : (60)

References (48)
  • 1
    • 80755188489 scopus 로고    scopus 로고
    • Aveska. http://www.aveksa.com/solutions/access-control-automation.cfm.
  • 2
    • 80755135000 scopus 로고    scopus 로고
    • SailPoint. http://www.sailpoint.com/product/compliance-manager/policy- enforcement.php.
  • 5
    • 26844544427 scopus 로고
    • Safety in grammatical protection systems
    • T. A. Budd. Safety in grammatical protection systems. Intl. Journal of Parallel Programming, 12(6):413-431, 1983.
    • (1983) Intl. Journal of Parallel Programming , vol.12 , Issue.6 , pp. 413-431
    • Budd, T.A.1
  • 6
    • 4243189286 scopus 로고    scopus 로고
    • Counterexample-guided abstraction refinement for symbolic model checking
    • E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample- guided abstraction refinement for symbolic model checking. J. ACM, 50(5):752-794, 2003.
    • (2003) J. ACM , vol.50 , Issue.5 , pp. 752-794
    • Clarke, E.1    Grumberg, O.2    Jha, S.3    Lu, Y.4    Veith, H.5
  • 9
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur., 6(2):201-231, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 12
  • 20
    • 55549143296 scopus 로고    scopus 로고
    • Automated verification of access control policies using a sat solver
    • G. Hughes and T. Bultan. Automated verification of access control policies using a sat solver. Int. J. Softw. Tools Technol. Transf., 10(6):503-520, 2008.
    • (2008) Int. J. Softw. Tools Technol. Transf. , vol.10 , Issue.6 , pp. 503-520
    • Hughes, G.1    Bultan, T.2
  • 22
  • 23
    • 84888820903 scopus 로고    scopus 로고
    • Weighted pushdown systems and trust-management systems
    • New York, NY, USA Springer-Verlag
    • S. Jha, S. Schwoon, H. Wang, and T. Reps. Weighted Pushdown Systems and Trust-Management Systems. In Proc. of TACAS, New York, NY, USA, 2006. Springer-Verlag.
    • (2006) Proc. of TACAS
    • Jha, S.1    Schwoon, S.2    Wang, H.3    Reps, T.4
  • 27
    • 30344471054 scopus 로고    scopus 로고
    • Computing over-approximations with bounded model checking
    • DOI 10.1016/j.entcs.2005.07.021, PII S157106610505245X
    • D. Kroening. Computing over-approximations with bounded model checking. Electron. Notes Theor. Comput. Sci., 144:79-92, January 2006. (Pubitemid 43060062)
    • (2006) Electronic Notes in Theoretical Computer Science , vol.144 , Issue.SPEC. ISS 1 , pp. 79-92
    • Kroening, D.1
  • 28
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • DOI 10.1145/1066100.1066103
    • N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. J. ACM, 52(3):474-514, 2005. (Pubitemid 43078378)
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 33
    • 80755134997 scopus 로고    scopus 로고
    • NuSMV. http://nusmv.irst.itc.it/.
  • 36
    • 0001549660 scopus 로고    scopus 로고
    • The arbac97 model for role-based administration of roles
    • R. Sandhu, V. Bhamidipati, and Q. Munawer. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105-135, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.1    Bhamidipati, V.2    Munawer, Q.3
  • 44
    • 3543115068 scopus 로고    scopus 로고
    • A layered design of discretionary access controls with decidable safety properties
    • J. A. Solworth and R. H. Sloan. A layered design of discretionary access controls with decidable safety properties. IEEE Symposium on Security and Privacy, 2004.
    • (2004) IEEE Symposium on Security and Privacy
    • Solworth, J.A.1    Sloan, R.H.2
  • 45
    • 85159711945 scopus 로고    scopus 로고
    • Safety analysis of the dynamic-typed access matrix model
    • LNCS, Springer Berlin / Heidelberg
    • M. Soshi. Safety analysis of the dynamic-typed access matrix model. In Computer Security - ESORICS 2000, LNCS, Springer Berlin / Heidelberg, 2000.
    • (2000) Computer Security - ESORICS 2000
    • Soshi, M.1
  • 47
    • 37249072460 scopus 로고    scopus 로고
    • Synthesising verified access control systems through model checking
    • N. Zhang, M. Ryan, and D. P. Guelev. Synthesising verified access control systems through model checking. J. Comput. Secur., 16(1):1-61, 2008. (Pubitemid 350264869)
    • (2008) Journal of Computer Security , vol.16 , Issue.1 , pp. 1-61
    • Zhang, N.1    Ryan, M.2    Guelev, D.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.