Conformance checking of RBAC policy and its implementation

被引:0
|
作者
Hansen, F [1 ]
Oleshchuk, V [1 ]
机构
[1] Agder Univ Coll, Dept Informat & Commun Technol, N-4876 Grimstad, Norway
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The purpose a security policy is to specify rules to govern access to system resources preferably without considering implementation details. Both policy and its implementation might be altered, and after introducing changes, it is not obvious that, they are consistent. Therefore, we need to validate conformance between policy and its implementation. In this paper we describe an approach based on finite-model checking to verify that a RBAC implementation conforms to a security policy. We make use of the model-checking system SPIN, and show how to express RBAC policy constraints by means of LTL and how to model an RBAC implementation in SPIN's internal modeling language PROMELA.
引用
收藏
页码:144 / 155
页数:12
相关论文
共 50 条
  • [1] Conformance Checking of RBAC Policies in Process-Aware Information Systems
    Baumgrass, Anne
    Baier, Thomas
    Mendling, Jan
    Strembeck, Mark
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, PT II, 2012, 100 : 435 - +
  • [2] RBAC policy implementation for SQL databases
    Barker, S
    Douglas, P
    [J]. DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 288 - 301
  • [3] Conflict checking of separation of duty constraints in RBAC - Implementation experiences
    Strembeck, M
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 224 - 229
  • [4] History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation
    Alizadeh, Mahdi
    de Leoni, Massimiliano
    Zannone, Nicola
    [J]. DATA-DRIVEN PROCESS DISCOVERY AND ANALYSIS, SIMPDA 2014, 2015, 237 : 58 - 78
  • [5] Analyzing RBAC Security Policy of Implementation Using AST
    Tuan-Hung Pham
    Ninh-Thuan Truong
    Viet-Ha Nguyen
    [J]. INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2009), 2009, : 215 - 219
  • [6] Conformance Checking: A Systemic View
    van Dongen, Boudewijn F.
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS, BPM 2021, 2022, 436 : 61 - 72
  • [7] Online Approximate Conformance Checking
    Guo, Xin
    Fang, Xianwen
    Mao, Gubao
    [J]. 2021 INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SOCIAL INTELLIGENCE (ICCSI), 2021,
  • [8] Automatic Modularity Conformance Checking
    Huynh, Sunny
    Cai, Yuanfang
    Song, Yuanyuan
    Sullivan, Kevin
    [J]. ICSE'08 PROCEEDINGS OF THE THIRTIETH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2008, : 411 - 420
  • [9] Conformance Checking in Process Mining
    Jans, Mieke
    De Weerdt, Jochen
    Depaire, Benoit
    Dumas, Marlon
    Janssenswillen, Gert
    [J]. INFORMATION SYSTEMS, 2021, 102
  • [10] A Framework for Online Conformance Checking
    Burattin, Andrea
    Carmona, Josep
    [J]. BUSINESS PROCESS MANAGEMENT WORKSHOPS (BPM 2017), 2018, 308 : 165 - 177