loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Yehia Elrakaiby 1 and Jun Pang 2

Affiliations: 1 Fraunhofer IESE, Germany ; 2 University of Luxembourg, Luxembourg

ISBN: 978-989-758-045-1

ISSN: 2184-2825

Keyword(s): Usage Control, Access Control, Policy Analysis, Formal Verification.

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Protection ; Formal Methods for Security ; Information and Systems Security ; Security and Privacy Policies ; Security Verification and Validation

Abstract: Usage control extends access control by enabling the specification of requirements that should be satisfied before, while and after access. To ensure that the deployment of usage control policies in target domains achieves the required security goals, policy verification and analysis tools are needed. In this paper, we present an approach for the dynamic analysis of usage control policies using formal descriptions of target domains and their usage control policies. Our approach provides usage control management explicit labeled transition system semantics and enables the automated verification of usage control policies using model checking.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.200.252.156

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Elrakaiby, Y. and Pang, J. (2014). Dynamic Analysis of Usage Control Policies.In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, ISSN 2184-2825, pages 88-100. DOI: 10.5220/0005046600880100

@conference{secrypt14,
author={Yehia Elrakaiby. and Jun Pang.},
title={Dynamic Analysis of Usage Control Policies},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={88-100},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005046600880100},
isbn={978-989-758-045-1},
}

TY - CONF

JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Dynamic Analysis of Usage Control Policies
SN - 978-989-758-045-1
AU - Elrakaiby, Y.
AU - Pang, J.
PY - 2014
SP - 88
EP - 100
DO - 10.5220/0005046600880100

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.