2005
DOI: 10.1007/978-3-540-31979-5_13
|View full text |Cite
|
Sign up to set email alerts
|

Conformance Checking of RBAC Policy and its Implementation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
18
0
1

Year Published

2008
2008
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 9 publications
0
18
0
1
Order By: Relevance
“…Hansen et al [13] utilize model checker SPIN to verify various static and dynamic separation of duty properties in RBAC. Their approach does not support any form of delegation, and the authors do not provide a theoretical performance bound.…”
Section: Other Access Control Verification Techniquesmentioning
confidence: 99%
“…Hansen et al [13] utilize model checker SPIN to verify various static and dynamic separation of duty properties in RBAC. Their approach does not support any form of delegation, and the authors do not provide a theoretical performance bound.…”
Section: Other Access Control Verification Techniquesmentioning
confidence: 99%
“…In [9], Hansen and Oleshchuk introduce an approach to check the implementation of RBAC constraints using the Spin 4 model checker. They formally express the given RBAC properties via LTL.…”
Section: Related Workmentioning
confidence: 99%
“…Schaad et al [17] verified separation of duty properties in RBAC systems using NuSMV. Hansen et al [8] utilized SPIN to verify various static and dynamic separation of duty properties in RBAC. Other work [6,7,9,19] also supports the use of formal tools to verify properties of security policies.…”
Section: Related Workmentioning
confidence: 99%