Conformance checking of RBAC policy and its implementation

被引:0
|
作者
Hansen, F [1 ]
Oleshchuk, V [1 ]
机构
[1] Agder Univ Coll, Dept Informat & Commun Technol, N-4876 Grimstad, Norway
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The purpose a security policy is to specify rules to govern access to system resources preferably without considering implementation details. Both policy and its implementation might be altered, and after introducing changes, it is not obvious that, they are consistent. Therefore, we need to validate conformance between policy and its implementation. In this paper we describe an approach based on finite-model checking to verify that a RBAC implementation conforms to a security policy. We make use of the model-checking system SPIN, and show how to express RBAC policy constraints by means of LTL and how to model an RBAC implementation in SPIN's internal modeling language PROMELA.
引用
收藏
页码:144 / 155
页数:12
相关论文
共 50 条
  • [21] Protecting federated databases using a practical implementation of a formal RBAC policy
    Barker, S
    Douglas, P
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 523 - 527
  • [22] Conformance Checking: Relating Processes and Models
    Carmona, Josep
    van Dongen, Boudewijn
    Weidlich, Matthias
    [J]. ADVANCED INFORMATION SYSTEMS ENGINEERING (CAISE 2019), 2019, 11483 : 700 - 700
  • [23] A Unified Approach to Architecture Conformance Checking
    Caracciolo, Andrea
    Lungu, Mircea Filip
    Nierstrasz, Oscar
    [J]. 2015 12TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2015, : 41 - 50
  • [24] Earth Movers' Stochastic Conformance Checking
    Leemans, Sander J. J.
    Syring, Anja F.
    van der Aalst, Wil M. P.
    [J]. BUSINESS PROCESS MANAGEMENT FORUM, BPM FORUM 2019, 2019, 360 : 127 - 143
  • [25] Scalable process discovery and conformance checking
    Sander J. J. Leemans
    Dirk Fahland
    Wil M. P. van der Aalst
    [J]. Software & Systems Modeling, 2018, 17 : 599 - 631
  • [26] A Algorithm for Conformance Checking Based on Statistics
    Li Zhao
    Zhang Liqun
    Huang Fangfang
    [J]. 2014 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND ENGINEERING APPLICATIONS (ISDEA), 2014, : 5 - 8
  • [27] Conformance Checking Approximation Using Simulation
    Sani, Mohammadreza Fani
    Gonzalez, Juan J. Garza
    van Zelst, Sebastiaan J.
    van der Aalst, Wil M. P.
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 105 - 112
  • [28] Architecture Conformance Checking with Description Logics
    Schroeder, Sandra
    Riebisch, Matthias
    [J]. 11TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE (ECSA 2017) - COMPANION VOLUME, 2017, : 167 - 173
  • [29] Distributed Process Discovery and Conformance Checking
    van der Aalst, Wil M. P.
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, FASE 2012, 2012, 7212 : 1 - 25
  • [30] Checking the Conformance of a Promela Design to its Formal Specification in Event-B
    Vu, Dieu-Huong
    Chiba, Yuki
    Yatake, Kenro
    Aoki, Toshiaki
    [J]. FORMAL TECHNIQUES FOR SAFETY-CRITICAL SYSTEMS, FTSCS 2014, 2015, 476 : 110 - 126