Role-Based Access Control modeling and validation | IEEE Conference Publication | IEEE Xplore

Role-Based Access Control modeling and validation


Abstract:

Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout...Show More

Abstract:

Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the security aspect of commercial security applications by exploring the nature and scope of the famous security policy - the Role Based Access Control Policy. We model it and check its consistency using the Alloy Analyzer.
Date of Conference: 07-10 July 2013
Date Added to IEEE Xplore: 06 March 2014
Electronic ISBN:978-1-4799-3755-4
Print ISSN: 1530-1346
Conference Location: Split, Croatia

References

References is not available for this document.