期刊文献+

基于模型检测的工作流访问控制策略验证 被引量:3

Validation of access control policies of workflow management system based on model checking
下载PDF
导出
摘要 访问控制策略的有效性对工作流管理系统的安全稳定运行具有重要影响,针对这一问题,提出了一种基于模型检测的工作流管理系统访问控制策略验证方法。建立了工作流管理系统的访问控制策略模型与工作流执行主体任务权限状态模型,并在此基础上对访问控制策略的有效性进行验证。实验表明该算法具有有效性和合理性,为访问控制策略的验证提供了一条新的解决途径。 The validity of access control policies seriously affects the safe and stable operation of the workflow management system. To deal with this problem, this paper presented a validation method of access control policies of the workflow management system based on the model checking. On the basis of the establishment of the access control policy model and the task permission state of the subjects of the workflow management system the effectiveness of policies were validated. The experiments show that the algorithm is effective and rational, and provides a new solution to validate the access control polices.
出处 《计算机应用研究》 CSCD 北大核心 2010年第2期692-696,共5页 Application Research of Computers
基金 国家"863"计划资助项目(2007AA01Z449) 中国博士后科学基金资助项目(20070420793)
关键词 工作流 访问控制策略 策略验证 模型检测 workflow access control policies policy validation model checking
  • 相关文献

参考文献8

  • 1MARTIN E. Automated test generation for access control policies [ C ]//Proc of Conference on Object-Oriented Programming Systems, Languages, and Applications. New York: Association for Computing Machinery, 2006:752-753.
  • 2FISLER K, KRISHNAMURTHI S, MEYEROVICH L A, et al. Verification and change-impact analysis of access-control policies [ C ]// Proc of the 27th International Conference on Software Engineering. New York : Association for Computing Machinery, 2005:96-205.
  • 3KNORR K. Dynamic access control through Petri net workflows [ C]//Proc of the 16th Annual Computer Security Applications Conference. New York : IEEE Computer Society,2000 : 159-167.
  • 4KNORR K. Multilevel security and information flow in Petri net workflows[ C]//Proc of the 9th International Conference on Telecommunication Systems-Modeling and Analysis, Special Session on Security Aspects of Telecommunication Systems. 2001:9-20.
  • 5JIANG Yi-xin, LIN Chuang, YIN Hao, et al. Security analysis of mandatory access control model [ C ]//Proc of IEEE International Conference on Systems, Man and Cybernetics. New York: Institute of Electrical and Electronics Engineers Ine, 2004: 5013-5018.
  • 6ZHANG N, RYAN M, GUELEV D P. Evaluating access control policies through model checking[ C]//Proc of the 8th Information Security Conference. Berlin : Springer-Verlag,2005:446- 460.
  • 7SCHAAD A, LOTZ V, SOHR K. A model checking approach to analysis organizational controls[ C]//Proc of the 11 th ACM Symposium on Access Control Models and Technologies. New York: Associa- tion for Computing Machinery,2006 : 139-149.
  • 8SCHAAD A, MOFFETT J. A lightweight approach to specification and analysis of role-based access control extensions [ C]//Proc of ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, 2002: 13-22.

同被引文献17

  • 1苏开乐,骆翔宇,吕关锋.符号化模型检测CTL[J].计算机学报,2005,28(11):1798-1806. 被引量:24
  • 2周伟平,陆松年.RBAC访问控制研究[J].计算机安全,2007(2):11-13. 被引量:4
  • 3Unal D,Caglayan M U.A formal role-based access controlmodel for security policies in multi-domain mobilenetworks[J].Computer Networks,2013,57(1).
  • 4Mirabadi A,Yazdi M B.Automatic generation and verificationof railway interlocking control tables usingFSM and NuSmv[J].International Journal for Engineering Modelling,2008,21(1/4).
  • 5Obiedkov S,Kourie D G,Eloff J H P.Building accesscontrol models with attribute exploration[J].Computerand Security,2009,28(1/2).
  • 6Moonzoo K,Yunho K,Hotae K.A comparative study ofsoftware model checkers as unit testing tools:an industrialcase study[J].IEEE Transactions on Software Engineering,2011,37(2).
  • 7Youngjoo K,Okjoo C,Moonzoo K,et al.Validating softwarereliability early through statistical model checking[J].IEEE Software,2013,30(3).
  • 8Henriques D,Martins J G,Zuliani P,et al.Statistical modelchecking for Markov decision processes[C].2012 NinthInternational Conference on Quantitative Evaluation ofSystems(QEST),2012:84-93.
  • 9Hu V C,Kuhn R,Xie Tao,et al.Model checking for verificationof mandatory access control models and properties[J].International Journal of Software Engineering andKnowledge Engineering,2011,21(1).
  • 10Han J,Susilo W,Mu Y,et al.Attribute based obliviousaccess control[J].The Computer Journal,2013,55(10).

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部