2007
DOI: 10.21236/ada462754
|View full text |Cite
|
Sign up to set email alerts
|

Apply Model Checking to Security Analysis in Trust Management

Abstract: The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of Defense, Washington Hleadquarters Services, Directorate for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…In the literature, trust and reputation models are analyzed typically through ad-hoc simulation [Kim 2009;Ganeriwal et al 2008;Zhang et al 2007;Kamvar et al 2003], sometimes by means of game theory [Li and Shen 2012], and, only in few cases, via model checking [Aldini 2015;Kwiatkowska et al 2013;He et al 2010;Reith et al 2007]. In most cases, the focus is on the validation of new models, while less attention is devoted to the formal, exhaustive comparison among different models with respect to efficiency requirements and robustness against the attack taxonomy.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…In the literature, trust and reputation models are analyzed typically through ad-hoc simulation [Kim 2009;Ganeriwal et al 2008;Zhang et al 2007;Kamvar et al 2003], sometimes by means of game theory [Li and Shen 2012], and, only in few cases, via model checking [Aldini 2015;Kwiatkowska et al 2013;He et al 2010;Reith et al 2007]. In most cases, the focus is on the validation of new models, while less attention is devoted to the formal, exhaustive comparison among different models with respect to efficiency requirements and robustness against the attack taxonomy.…”
Section: Conclusion and Related Workmentioning
confidence: 99%
“…Programs that violated a property were not verifiable and flagged for review. Model checking has also been used to verify security properties of access control policies [Gue04,Rei07b].…”
Section: Formal Models Of Security Measurement and Metricsmentioning
confidence: 99%
“…We suggest role dependency graphs as a model for our policy because it shows the nature of the delegation chain and how users/principals are introduced into the policy. A role dependency graph (RDG) [17] is a tool for visually depicting and analyzing role-to-role and role-toprincipal relationships.…”
Section: B the Trust Policy Layermentioning
confidence: 99%