skip to main content
10.1145/2070425.2070466acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Formal analysis of usage control policies

Published:14 November 2011Publication History

ABSTRACT

This paper offers a set of translation rules to generate timed automata from the NOMAD specification language. We detail the rules and the process of the translation. The ultimate goal of this systematic translation is to perform model-checking over the translated specification.

References

  1. Xacml: extensible access control markup language. In Version 2.0. Available from: http://www.oasis-open.org/ committees /xacml/.Google ScholarGoogle Scholar
  2. R. Alur and D. L. Dill. A theory of timed automata. Theoretical Computer Science, 126:183--235, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Behrmann, R. David, and K. G. Larsen. A tutorial on uppaal. pages 200--236. Springer, 2004.Google ScholarGoogle Scholar
  4. F. Cuppens, N. Cuppens-Boulahia, and T. Sans. Nomad: A security model with non atomic actions and deadlines. In Proceedings of the 18th IEEE workshop on Computer Security Foundations, pages 186--196, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. A. E. Kalam, S. Benferhat, A. Miège, R. E. Baida, F. Cuppens, C. Saurel, P. Balbiani, Y. Deswarte, and G. Trouessin. Organization based access control. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, pages 120--, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Mallouli, A. Mammar, and A. R. Cavalli. Integration of timed security policies within a tefsm specification. In Telecom SudParis, Technical Report TI-PU-08--868, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Formal analysis of usage control policies

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '11: Proceedings of the 4th international conference on Security of information and networks
          November 2011
          276 pages
          ISBN:9781450310208
          DOI:10.1145/2070425

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 November 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%
        • Article Metrics

          • Downloads (Last 12 months)2
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader