2008
DOI: 10.3233/jcs-2008-16101
|View full text |Cite
|
Sign up to set email alerts
|

Synthesising verified access control systems through model checking

Abstract: We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. RW is designed for modelling access control policies, and verifying their properties. The RW language is very expressive, allowing us to model complex access conditions which can depend on data values, other permissions, and agent roles.A property expresses the capability of a coalition of agents to achieve a goal, which may include r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 41 publications
(26 citation statements)
references
References 31 publications
0
26
0
Order By: Relevance
“…Their approach is limited in modeling knowledge gained by the interaction of agents in a multi-agent system. RW framework [2] has the most similar approach with ours. The transition system in RW is build over the knowledge of the active coalition of agents.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…Their approach is limited in modeling knowledge gained by the interaction of agents in a multi-agent system. RW framework [2] has the most similar approach with ours. The transition system in RW is build over the knowledge of the active coalition of agents.…”
Section: Related Workmentioning
confidence: 97%
“…They also allow controlling access to the data based on the user roles. In such multi-agent systems, access to the data is regulated by dynamic access control policies, which are a class of authorization rules that the permissions for an agent depend on the state of the system and change when agents interact with the system [1][2][3]. In complicated access control scenarios, there is always a risk that some required properties do not hold in the system.…”
Section: Introductionmentioning
confidence: 99%
“…For instance, Zhang et al [31] propose RW (Read and Write), a formalism based on propositional logic, for the specification of access control policies. Based on this formalism, they employ symbolic model-checking to verify properties against a policy model expressed in RW.…”
Section: Related Workmentioning
confidence: 99%
“…Zhang et al [40,41,42] provide a model checking algorithm for evaluating access control systems and present the computational complexity of the algorithm. This approach can be used to detect, in an access control policy, errors caused by the interactions of policy rules and coalitions among multiple agents.…”
Section: Other Access Control Verification Techniquesmentioning
confidence: 99%