ABSTRACT
This paper offers a set of translation rules to generate timed automata from the NOMAD specification language. We detail the rules and the process of the translation. The ultimate goal of this systematic translation is to perform model-checking over the translated specification.
- Xacml: extensible access control markup language. In Version 2.0. Available from: http://www.oasis-open.org/ committees /xacml/.Google Scholar
- R. Alur and D. L. Dill. A theory of timed automata. Theoretical Computer Science, 126:183--235, 1994. Google ScholarDigital Library
- G. Behrmann, R. David, and K. G. Larsen. A tutorial on uppaal. pages 200--236. Springer, 2004.Google Scholar
- F. Cuppens, N. Cuppens-Boulahia, and T. Sans. Nomad: A security model with non atomic actions and deadlines. In Proceedings of the 18th IEEE workshop on Computer Security Foundations, pages 186--196, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarDigital Library
- A. A. E. Kalam, S. Benferhat, A. Miège, R. E. Baida, F. Cuppens, C. Saurel, P. Balbiani, Y. Deswarte, and G. Trouessin. Organization based access control. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, pages 120--, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarDigital Library
- W. Mallouli, A. Mammar, and A. R. Cavalli. Integration of timed security policies within a tefsm specification. In Telecom SudParis, Technical Report TI-PU-08--868, 2008.Google Scholar
Index Terms
- Formal analysis of usage control policies
Recommendations
Formal model and policy specification of usage control
The recent usage control model (UCON) is a foundation for next-generation access control models with distinguishing properties of decision continuity and attribute mutability. A usage control decision is determined by combining authorizations, ...
Dynamic Analysis of Usage Control Policies
ICETE 2014: Proceedings of the 11th International Joint Conference on e-Business and Telecommunications - Volume 4Usage control extends access control by enabling the specification of requirements that should be satisfied before, while and after access. To ensure that the deployment of usage control policies in target domains achieves the required security goals, ...
Specifying a Usage Control System
SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and TechnologiesModern system architectures require sophisticated access and usage control mechanisms. The need stems from demanding requirements for security, data sovereignty and privacy regulations, as well as the challenges presented by architectural approaches ...
Comments