Security analysis of temporal RBAC under an administrative model
暂无分享,去创建一个
Vijayalakshmi Atluri | Jaideep Vaidya | Shamik Sural | Sadhana Jha | V. Atluri | S. Sural | Jaideep Vaidya | S. Jha
[1] Alessandro Armando,et al. Efficient symbolic automated analysis of administrative attribute-based RBAC-policies , 2011, ASIACCS '11.
[2] Shamik Sural,et al. Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..
[3] Yeping He,et al. A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty , 2006, Inscrypt.
[4] Ravi S. Sandhu. The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[5] Ravi Sandhu,et al. A Role-Based Delegation Model and Some Extensions , 2000 .
[6] Behzad Bordbar,et al. Transformation of Spatio-Temporal Role Based Access Control Specification to Alloy , 2012, MEDI.
[7] Elisa Bertino,et al. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.
[8] Shamik Sural,et al. STARBAC: Spatio temporal Role Based Access C ontrol , 2007, OTM Conferences.
[9] Elisa Bertino,et al. TRBAC , 2001, ACM Trans. Inf. Syst. Secur..
[10] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[11] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[12] Lawrence Snyder. On the synthesis and analysis of protection systems , 1977, SOSP '77.
[13] Wang Yi,et al. Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.
[14] Manachai Toahchoodee,et al. Using alloy to analyse a spatio-temporal access control model supporting delegation , 2009, IET Inf. Secur..
[15] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[16] Manachai Toahchoodee,et al. A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.
[17] Luigi V. Mancini,et al. A graph-based formalism for RBAC , 2002, TSEC.
[18] Ninghui Li,et al. The Foundational Work of Harrison-Ruzzo-Ullman Revisited , 2013, IEEE Transactions on Dependable and Secure Computing.
[19] Jeremy L. Jacob,et al. The role-based access control system of a European bank: a case study and discussion , 2001, SACMAT '01.
[20] C. R. Ramakrishnan,et al. Efficient policy analysis for administrative role based access control , 2007, CCS '07.
[21] Anna Lisa Ferrara,et al. Policy Analysis for Self-administrated Role-Based Access Control , 2013, TACAS.
[22] Andreas Schaad,et al. A lightweight approach to specification and analysis of role-based access control extensions , 2002, SACMAT '02.
[23] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[24] Indrakshi Ray,et al. LRBAC: A Location-Aware Role-Based Access Control Model , 2006, ICISS.
[25] Jeffrey D. Ullman,et al. On protection in operating systems , 1975, SOSP.
[26] Vijayalakshmi Atluri,et al. An Administrative Model for Spatio-Temporal Role Based Access Control , 2013, ICISS.
[27] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[28] Vijayalakshmi Atluri,et al. Towards formal security analysis of GTRBAC using timed automata , 2009, SACMAT '09.
[29] Ravi S. Sandhu,et al. The ARBAC99 model for administration of roles , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).
[30] Ravi S. Sandhu,et al. A model for role administration using organization structure , 2002, SACMAT '02.
[31] Vijayalakshmi Atluri,et al. AMTRAC: An administrative model for temporal role-based access control , 2013, Comput. Secur..
[32] Manachai Toahchoodee,et al. On the formalization and analysis of a spatio-temporal role-based access control model , 2011, J. Comput. Secur..
[33] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[34] Sylvia L. Osborn. Mandatory access control and role-based access control revisited , 1997, RBAC '97.
[35] Vijayalakshmi Atluri,et al. Analyzing temporal role based access control models , 2012, SACMAT '12.
[36] Ninghui Li,et al. Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.
[37] Martin C. Rinard,et al. Automatic error finding in access-control policies , 2011, CCS '11.
[38] Vijayalakshmi Atluri,et al. Analysis of TRBAC with Dynamic Temporal Role Hierarchies , 2013, DBSec.
[39] Kurt Jensen,et al. Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .
[40] Indrakshi Ray,et al. Using uml to visualize role-based access control constraints , 2004, SACMAT '04.
[41] Shamik Sural,et al. Security Analysis of Temporal-RBAC Using Timed Automata , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[42] Elisa Bertino,et al. A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.
[43] Ravi S. Sandhu,et al. Safety analysis for the extended schematic protection model , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.