A Light-Weight Formal Approach for Modeling, Verifying and Integrating Role-Based Access Control Requirements

被引:1
|
作者
Zafar, Saad
机构
关键词
Role-Based Access Control; Security Requirements; Model-Checking; Light-weight Formal Methods; VERIFICATION;
D O I
10.1109/APSEC.2009.41
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the complexity of access control requirements is increasing to protect valuable organizational data the value of correct specification and integration of access rights into the system specification has also increased. Role-based access control (RBAC) facilitates specification of access control requirements in a flexible manner. However, various available models do not always support effective integration of the requirements into rest of the system specification. Furthermore, automated verification of RBAC model poses the challenge of state-explosion. In this paper we propose a lightweight formal method for model-checking of RBAC specification. We use BT-RBAC model to specify access control requirements. The model is based on a graphical notation with formal semantics and supports a requirements translation process, strong traceability of requirements, and uses a single notation to support effective integration of the model. The automated translation into SAL specification input language is used to formally verify the correctness of the model.
引用
收藏
页码:257 / 264
页数:8
相关论文
共 50 条
  • [1] Integrating Attributes into Role-Based Access Control
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX, 2015, 9149 : 242 - 249
  • [2] A Verifiable Modeling Approach to Configurable Role-Based Access Control
    Kim, Dae-Kyoo
    Lu, Lunjin
    Kim, Sangsig
    [J]. FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING, PROCEEDINGS, 2010, 6013 : 188 - 202
  • [3] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [4] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [5] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
  • [6] A feature-based approach for modeling role-based access control systems
    Kim, Sangsig
    Kim, Dae-Kyoo
    Lu, Lunjin
    Kim, Suntae
    Park, Sooyong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2035 - 2052
  • [7] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [8] A novel approach to role-based access control
    Chae, SH
    Kim, W
    Kim, DK
    [J]. COMPUTATIONAL SCIENCE - ICCS 2003, PT IV, PROCEEDINGS, 2003, 2660 : 1060 - 1068
  • [9] A novel approach for role-based access control
    Yang Geng
    Rong Chunming
    Shen Jiangang
    Wang Jiangtao
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01) : 1 - 6
  • [10] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618