A Formal Verification of a Subset of Information-Based Access Control Based on Extended Weighted Pushdown System

被引:0
|
作者
Lamilla Alvarez, Pablo [1 ]
Takata, Yoshiaki [1 ]
机构
[1] Kochi Univ Technol, Kami 7828502, Japan
来源
关键词
weighted pushdown systems; access control; model checking;
D O I
10.1587/transinf.E97.D.1149
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information-Based Access Control (IBAC) has been proposed as an improvement to History-Based Access Control (HBAC) model. In modern component-based systems, these access control models verify that all the code responsible for a security-sensitive operation is sufficiently authorized to execute that operation. The HBAC model, although safe, may incorrectly prevent the execution of operations that should be executed. The IBAC has been shown to be more precise than HBAC maintaining its safety level while allowing sufficiently authorized operations to be executed. However the verification problem of IBAC program has not been discussed. This paper presents a formal model for IBAC programs based on extended weighted pushdown systems (EWPDS). The mapping process between the IBAC original semantics and the EWPDS structure is described. Moreover, the verification problem for IBAC programs is discussed and several typical IBAC program examples using our model are implemented.
引用
收藏
页码:1149 / 1159
页数:11
相关论文
共 50 条
  • [1] Formal Verification for Access Control in Web Information Sharing System
    Sakai, Akihiro
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 80 - +
  • [2] Information-based optimization approaches to dynamical system safety verification
    Neller, TW
    [J]. HYBRID SYSTEMS: COMPUTATION AND CONTROL, 1998, 1386 : 346 - 359
  • [3] Formal Verification of Communication Based Train Control System
    Xie, Guo
    Hei, Xinhong
    Asano, Akira
    Mochizuki, Hiroshi
    Takahashi, Sei
    Nakamura, Hideo
    [J]. 2011 INTERNATIONAL CONFERENCE ON QUALITY, RELIABILITY, RISK, MAINTENANCE, AND SAFETY ENGINEERING (ICQR2MSE), 2011, : 394 - 399
  • [4] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [5] Platform for access control management in information system based on extended RBAC model
    Poniszewska-Maranda, Aneta
    [J]. 12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 510 - 517
  • [6] Multi-formal and Information-based Emergency Resource Reserve System in China
    Hua, Li
    He Jinsheng
    Zhu Xianmin
    [J]. CHINESE JOURNAL OF POPULATION RESOURCES AND ENVIRONMENT, 2008, 6 (04) : 52 - 58
  • [7] Multi-formal and Information-based Emergency Resource Reserve System in China
    Li Hua1
    2. Tianjin Headquarters of the Armed Police
    3. Scientific and Technology Division
    [J]. Chinese Journal of Population,Resources and Environment, 2008, (04) : 52 - 58
  • [8] Medical Information Access Control Method Based on Weighted Information Entropy
    Zheng, Lijuan
    Zhang, Linhao
    Cui, Meng
    Chen, Jianyou
    Yang, Shaobo
    Li, Zhaoxuan
    [J]. CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 113 - 122
  • [9] Information Flow Control in Software DB Units Based on Formal Verification
    A. A. Timakov
    [J]. Programming and Computer Software, 2022, 48 : 265 - 285
  • [10] Information Flow Control in Software DB Units Based on Formal Verification
    Timakov, A. A.
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 2022, 48 (04) : 265 - 285