Static analysis based correctness verification for mandatory access control framework

被引:0
|
作者
Wu, Xin-Song [1 ,2 ]
Zhou, Zhou-Yi [1 ,2 ]
He, Ye-Ping [1 ]
Liang, Hong-Liang [1 ]
Yuan, Chun-Yang [3 ]
机构
[1] Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
[2] Graduate University, Chinese Academy of Sciences, Beijing 100049, China
[3] National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China
来源
关键词
Static analysis;
D O I
10.3724/SP.J.1016.2009.00730
中图分类号
学科分类号
摘要
引用
收藏
页码:730 / 739
相关论文
共 50 条
  • [21] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [22] A policy based framework for access control
    Nabhen, R
    Jamhour, E
    Maziero, C
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 47 - 59
  • [23] Integrating object oriented role-based access control model with mandatory access control principles
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2003, 43 (03) : 40 - 49
  • [24] AKER: A Design and Verification Framework for Safe and Secure SoC Access Control
    Restuccia, Francesco
    Meza, Andres
    Kastner, Ryan
    2021 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER AIDED DESIGN (ICCAD), 2021,
  • [25] A framework for the static verification of API calls
    Spinellis, Diomidis
    Louridas, Panagiotis
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1156 - 1168
  • [26] A Dynamic Mandatory Access Control Model
    Jafarian, Jafar Haadi
    Amini, Morteza
    Jalili, Rasool
    ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 862 - 866
  • [27] Mandatory access control in clustered servers
    Zakrzewski, M
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVI, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATION, 2003, : 143 - 149
  • [28] Mandatory access control in workflow systems
    Cvrcek, D
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2000, 62 : 247 - 254
  • [29] Mandatory Access Control for Android Application
    Na, June-seung
    Kim, Younghoon
    Choi, Young-June
    Pak, Wooguil
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 299 - 300
  • [30] Correctness verification of synchronization based workflow model
    Cai, J
    Zhao, W
    Zhang, SK
    Wang, LF
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 527 - 530