Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/WORDS.2005.11guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Role-Based Access Control Policy Verification Framework for Real-Time Systems

Published: 02 February 2005 Publication History

Abstract

This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The temporal and event-based semantics of these applications can be expressed using event-driven Role Based Access Control (RBAC) model. Any comprehensive access control model such as RBAC requires verification and validation mechanisms to ensure the consistency of access control specification. An inconsistent access control specification exposes the underlying system to numerous vulnerabilities and security risks. In this paper, we propose a Petri-Net based framework for verifying the correctness of event-driven RBAC policies.

Cited By

View all
  • (2019)Mutual AuthorizationsProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325415(213-218)Online publication date: 28-May-2019
  • (2018)Model-driven run-time enforcement of complex role-based access control policiesProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238167(248-258)Online publication date: 3-Sep-2018
  • (2017)High-level and formal router policy verificationJournal of Computing Sciences in Colleges10.5555/3144605.314463133:1(118-128)Online publication date: 1-Oct-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
WORDS '05: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
February 2005
421 pages
ISBN:0769523471

Publisher

IEEE Computer Society

United States

Publication History

Published: 02 February 2005

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Mutual AuthorizationsProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3325415(213-218)Online publication date: 28-May-2019
  • (2018)Model-driven run-time enforcement of complex role-based access control policiesProceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering10.1145/3238147.3238167(248-258)Online publication date: 3-Sep-2018
  • (2017)High-level and formal router policy verificationJournal of Computing Sciences in Colleges10.5555/3144605.314463133:1(118-128)Online publication date: 1-Oct-2017
  • (2016)GemRBAC-DSLProceedings of the 21st ACM on Symposium on Access Control Models and Technologies10.1145/2914642.2914656(179-190)Online publication date: 6-Jun-2016
  • (2015)Automated Model-Based Testing of Role-Based Access Control Using Predicate/Transition NetsIEEE Transactions on Computers10.1109/TC.2014.237518964:9(2490-2505)Online publication date: 1-Sep-2015
  • (2015)A comprehensive modeling framework for role-based access control policiesJournal of Systems and Software10.1016/j.jss.2015.05.015107:C(110-126)Online publication date: 1-Sep-2015
  • (2015)Information leak detection in business process modelsInformation Systems10.1016/j.is.2013.12.00647:C(244-257)Online publication date: 1-Jan-2015
  • (2013)Specification and analysis of access control policies for mobile applicationsProceedings of the 18th ACM symposium on Access control models and technologies10.1145/2462410.2463206(173-184)Online publication date: 12-Jun-2013
  • (2013)Secure interoperation design in multi-domains environments based on colored Petri netsInformation Sciences: an International Journal10.1016/j.ins.2012.09.027221(591-606)Online publication date: 1-Feb-2013
  • (2012)Automatic information flow analysis of business process modelsProceedings of the 10th international conference on Business Process Management10.1007/978-3-642-32885-5_13(172-187)Online publication date: 3-Sep-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media