Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies - SACMAT '06 2006
DOI: 10.1145/1133058.1133079
|View full text |Cite
|
Sign up to set email alerts
|

A model-checking approach to analysing organisational controls in a loan origination process

Abstract: ABSTRACT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2007
2007
2014
2014

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 72 publications
(44 citation statements)
references
References 36 publications
0
44
0
Order By: Relevance
“…Our approach provides the user with a level of abstraction which is much closer to the process being modeled and provides a number of important advantages including (i) the separate specification of the workflow and of the access control policy and (ii) the formal specification of the security properties as LTL formulae that specify the allowed behavior of the access-controlled workflow system. This is not the case in the approach presented in [1], where even small changes in the workflow or in the access control policy may affect the specification of the whole transition system and the specification of the security property is relative to the (low level) transition system. In our approach the compilation of the access controlled workflow system and of the expected security properties into the corresponding planning system and properties (resp.)…”
Section: Related Workmentioning
confidence: 96%
See 3 more Smart Citations
“…Our approach provides the user with a level of abstraction which is much closer to the process being modeled and provides a number of important advantages including (i) the separate specification of the workflow and of the access control policy and (ii) the formal specification of the security properties as LTL formulae that specify the allowed behavior of the access-controlled workflow system. This is not the case in the approach presented in [1], where even small changes in the workflow or in the access control policy may affect the specification of the whole transition system and the specification of the security property is relative to the (low level) transition system. In our approach the compilation of the access controlled workflow system and of the expected security properties into the corresponding planning system and properties (resp.)…”
Section: Related Workmentioning
confidence: 96%
“…SoD amounts to requiring that some critical tasks are executed by different agents. This can be achieved by constraining the assignment of roles (Static SoD), their activation (Dynamic SoD) or even the execution of tasks [1]. In this paper we focus on Object-based SoD (ObjSoD) and Operational SoD (OpSoD).…”
Section: Security-sensitive Business Processesmentioning
confidence: 99%
See 2 more Smart Citations
“…Schaad et al [34] also verify separation of duty properties in the context of a work flow process utilizing an RBAC system. The goal of this work is to identify a sequence of delegations and revocations that may place a principal into two or more roles that would be characterized as unsafe.…”
Section: Other Access Control Verification Techniquesmentioning
confidence: 99%