A Light-Weight Formal Approach for Modeling, Verifying and Integrating Role-Based Access Control Requirements

被引:1
|
作者
Zafar, Saad
机构
关键词
Role-Based Access Control; Security Requirements; Model-Checking; Light-weight Formal Methods; VERIFICATION;
D O I
10.1109/APSEC.2009.41
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As the complexity of access control requirements is increasing to protect valuable organizational data the value of correct specification and integration of access rights into the system specification has also increased. Role-based access control (RBAC) facilitates specification of access control requirements in a flexible manner. However, various available models do not always support effective integration of the requirements into rest of the system specification. Furthermore, automated verification of RBAC model poses the challenge of state-explosion. In this paper we propose a lightweight formal method for model-checking of RBAC specification. We use BT-RBAC model to specify access control requirements. The model is based on a graphical notation with formal semantics and supports a requirements translation process, strong traceability of requirements, and uses a single notation to support effective integration of the model. The automated translation into SAL specification input language is used to formally verify the correctness of the model.
引用
收藏
页码:257 / 264
页数:8
相关论文
共 50 条
  • [21] Formal Z specifications of several flat Role-Based Access Control models
    Abdallah, Ali E.
    Khayat, Etienne J.
    [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
  • [22] On the formal analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
  • [23] A Light-Weight Approach for Verifying Multi-Threaded Programs with CPAchecker
    Beyer, Dirk
    Friedberger, Karlheinz
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2016, (233): : 61 - 71
  • [24] Access Control in XML Repositories Using a Role-Based Approach
    Chen, Shihn-Yuarn
    Ke, Hao-Ren
    Tsai, Wen-Nung
    Yang, Wei-Pang
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (07): : 1041 - 1056
  • [25] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [26] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [27] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [28] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [29] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [30] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100