期刊文献+

基于角色访问控制系统中角色结构安全性分析问题的模型检测验证 被引量:4

RRA-SAP Security Verification Based on Model Checking for RBAC Access Control Systems
下载PDF
导出
摘要 提出了一种与角色结构相关的安全性分析问题(RRA-SAP),分析了角色结构对系统安全性的影响,证明了其计算复杂度,采用模型检测技术得到将RRA-SAP转化为模型检测问题的自动化验证算法,并验证了其有效性.结果表明,该算法可以在期望的时间内自动解决RRA-SAP问题. A new security analysis problem named role-role assignment-security analysis problem(RRA-SAP) was proposed.The impact of role hierarchy changes on security was analyzed,and the computational complexity of this problem proved.An algorithm of translating RRA-SAP into a Model checking formalism was also proposed to do automatic verification,and to prove the feasibility of this method.The experiment shows that this algorithm can automaticly solve RRA-SAP in expected time.
作者 邹林 潘理
出处 《上海交通大学学报》 EI CAS CSCD 北大核心 2010年第9期1192-1196,共5页 Journal of Shanghai Jiaotong University
基金 国家自然科学基金项目(60903191) 国家高技术研究发展计划(863)项目(2007AA01Z457)
关键词 角色结构 安全性分析问题 模型检测 role-role assignment(RRA) security analysis problem(SAP) model checking
  • 相关文献

参考文献9

  • 1Li N H,Mitchell J C,Winsborough W H.Beyond proofofcompliance: security analysis in trust management[J].Journal of the ACM (JACM),2005,52(3):474-514.
  • 2Sandhu R S,Bhamidipati V,Munawer Q.The ARBAC97 model for rolebased administration of roles[J].ACM Trans,2000,2 (1):105-135.
  • 3Jha S,Li N H,Wang Q H.Toward formal verification of rolebased access control policies[J].IEEE Transactions on Dependable and Secure Computing,2008,5(4): 242-255.
  • 4Hu H X,Ahn G J.Enabling verification and conformance testing for access control model[C]//Proceedings of 13th ACM Symposium on Access Control Models and Technologies (SACMAT).Colorado,USA: Andras Veres,2008:195-204.
  • 5Sandhu R S,Munawer Q.The RRA97 model for rolebased administration of role hierarchies[C]//Proceedings of the 14th Annual Computer Security Applications.Phoenix,AZ: ACSAC,1998:39-50.
  • 6Joshi J B D,Bertino E,Latif U.A generalized temporal rolebased access control model[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(1):4-23.
  • 7Clarke E M,Grumberg O,Peled D A.Model checking[M].Massachusetts,USA:MIT Press,2000.
  • 8Jackson D.Alloy: A lightweight object modeling notation[J].ACM Trans Softw Eng Methodol,2002,11(2):256-290.
  • 9Reith M,Niu J W,Winsborough W H.Toward practical analysis for trust management policy[C]//ASIAN ACM Symposium on Information.Sydney: Computer and Communications Security,2009:310-321.

同被引文献35

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部