Loading [MathJax]/extensions/MathZoom.js
Role-Based Access Control modeling and validation | IEEE Conference Publication | IEEE Xplore

Role-Based Access Control modeling and validation


Abstract:

Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout...Show More

Abstract:

Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the security aspect of commercial security applications by exploring the nature and scope of the famous security policy - the Role Based Access Control Policy. We model it and check its consistency using the Alloy Analyzer.
Date of Conference: 07-10 July 2013
Date Added to IEEE Xplore: 06 March 2014
Electronic ISBN:978-1-4799-3755-4
Print ISSN: 1530-1346
Conference Location: Split, Croatia

I. INTRODUCTION

The goal of information systems is to control or manage the access of subjects (users, processes) to objects (data, programs). This control is governed by a set of rules and objectives called a security policy. Data integrity is defined as “the quality, correctness, authenticity, and accuracy of information stored within an information system” [1]. Systems integrity is the successful and correct operation of information resources. Integrity models are used to describe what needs to be done to enforce the information integrity policies. There are three goals of integrity:

References

References is not available for this document.