Specification and verification of security requirements in a programming model for decentralized CSCW systems

被引:9
作者
Ahmed, Tanvir [1 ]
Tripathi, Anand R. [1 ]
机构
[1] Univ Minnesota, Dept Comp Sci, Minneapolis, MN 55455 USA
关键词
management; design; security; verification; security policy specification; role-based access control; methodology for access-control policy design; finite state-based model checking;
D O I
10.1145/1237500.1237503
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present, in this paper, a role-based model for programming distributed CSCW systems. This model supports specification of dynamic security and coordination requirements in such systems. We also present here a model-checking methodology for verifying the security properties of a design expressed in this model. The verification methodology presented here is used to ensure correctness and consistency of a design specification. It is also used to ensure that sensitive security requirements cannot be violated when policy enforcement functions are distributed among the participants. Several aspect-specific verification models are developed to check security properties, such as task-flow constraints, information flow, confidentiality, and assignment of administrative privileges.
引用
收藏
页数:34
相关论文
共 46 条
[1]  
AHMED T, 2004, THESIS U MINNESOTA
[2]  
AHMED T, 1939, P 8 ACM S ACC CONTR, P196
[3]  
Ahn G.-J., 2000, ACM Transactions on Information and Systems Security, V3, P207, DOI 10.1145/382912.382913
[4]  
[Anonymous], LECT NOTES COMPUTER
[5]  
[Anonymous], 1997, RBAC 97
[6]  
Bacon J., 2002, ACM Transactions on Information and Systems Security, V5, P492, DOI 10.1145/581271.581276
[7]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[8]  
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[9]  
Bhatti R., 2005, ACM Transactions on Information and Systems Security, V8, P187, DOI 10.1145/1065545.1065547
[10]  
Campbell RH, 1974, LECT NOTES COMPUTER, V16