Formal Verification for Access Control in Web Information Sharing System

被引:0
|
作者
Sakai, Akihiro [1 ]
Hori, Yoshiaki [2 ]
Sakurai, Kouichi [2 ]
机构
[1] Kyushu Univ, Grad Sch Informat Sci & Elect Engn, Fukuoka 812, Japan
[2] Kyushu Univ, Fac Informat Sci & Elect Engn, Fukuoka 812, Japan
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.
引用
收藏
页码:80 / +
页数:2
相关论文
共 50 条
  • [1] Formal Verification of the Universal Physical Access Control System (UPACS)
    Carryl, Clyde
    Alhalabi, Bassem
    Bullard, Lofton
    [J]. 2015 RESILIENCE WEEK (RSW), 2015, : 43 - 48
  • [2] A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System
    Lamilla Alvarez, Pablo
    Takata, Yoshiaki
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (05): : 1149 - 1159
  • [3] Formal Verification of Access Control Model for My Health Record System
    Rivera, Victor
    [J]. 2020 25TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2020), 2020, : 21 - 30
  • [4] Formal and semi-formal verification of a web voting system
    Cristia, Maximiliano
    Frydman, Claudia
    [J]. INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2015, 11 (02) : 183 - 204
  • [5] Verification of access control coherence in information system during modifications
    Goncalves, G
    Hemery, F
    Poniszewska, A
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 232 - 237
  • [6] Formal Verification of Mandatory access control for Privacy Cloud
    Zhu, Yi
    Zhu, Hong
    [J]. 2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 297 - 300
  • [7] UML specification of access control policies and their formal verification
    Koch M.
    Parisi-Presicce F.
    [J]. Software & Systems Modeling, 2006, 5 (4) : 429 - 447
  • [8] A Formal Approach for the Verification of AWS IAM Access Control Policies
    Zahoor, Ehtesham
    Asma, Zubaria
    Perrin, Olivier
    [J]. SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017), 2017, 10465 : 59 - 74
  • [9] A double access control model for web services based information system
    Chen, Xueqin
    Wu, Huizhong
    Zhu, Yaoqin
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 1045 - 1050
  • [10] Verification of Access Control Requirements in Web Services Choreography
    Paci, Federica
    Ouzzani, Mourad
    Mecella, Massimo
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 5 - +