Ensuring Spatio-Temporal Access Control for Real-World Applications

被引:0
作者
Toahchoodee, Manachai [1 ]
Ray, Indrakshi [1 ]
Anastasakis, Kyriakos
Georg, Geri [1 ]
Bordbar, Behzad
机构
[1] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES | 2009年
关键词
Modeling; Spatio-Temporal RBAC; UML; Alloy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decisions. Consequently, they are inadequate for specifying the access control needs of many complex real-world applications, such as the Dengue Decision Support (DDS) that we discuss in this paper. We need to ensure that such applications are adequately protected using emerging access control models. This requires us to represent the application and its access control requirements in a formal specification language. We choose the Unified Modeling Language (UML) for this purpose, since UML is becoming the defacto specification language in the software industry. We need to analyze this formal specification to get assurance that the application is adequately protected. Manual analysis is error-prone and tedious. Thus, we need automated tools for verification of UML models. Towards this end, we propose that the UML models be converted to Alloy. Alloy is based on first-order logic, has a software infrastructure that supports automated analysis, and has been used for the verification of real-world applications. We show how to convert the UML models to Alloy and verify the resulting model using the Alloy Analyzer which has embedded SAT-solvers. The results from the Alloy Analyzer will help uncover the flaws in the specification and help us refine the application and its access control requirements.
引用
收藏
页码:13 / 22
页数:10
相关论文
共 42 条
[1]  
ANASTASAKIS K, 2009, J SOFTWARE IN PRESS
[2]  
Anastasakis K, 2007, LECT NOTES COMPUT SC, V4735, P436
[3]  
[Anonymous], UN MOD LANG SUP VERS
[4]  
[Anonymous], 2003, MDA Explained, the Model Driven Architecture: Practice and Promise
[5]  
Ardagna ClaudioA., 2006, Proceedings of the 2006 ACM Symposium on Information, computer and communications security, ASIACCS '06, P212
[6]  
Bertino E., 2000, Proceedings of the fifth ACM workshop on Role-based access control, RBAC '00, P21, DOI [10.1145/344287.344298, DOI 10.1145/344287.344298]
[7]  
Bertino Elisa., 2005, SACMAT 05, P29
[8]  
Bordbar B., 2005, IADIS AC, P209
[9]  
Bordbar B, 2006, LECT NOTES COMPUT SC, V3888, P44
[10]  
Covington M.J., 2001, P 6 ACM S ACCESS CON, P10