A First Step Towards Formal Verification of Security Policy Properties for RBAC.
Michael DrouineaudMaksym BortinPaolo TorriniKarsten SohrPublished in: QSIC (2004)
Keyphrases
- formal verification
- security policies
- access control
- access control policies
- model checking
- role based access control
- access control systems
- security management
- fine grained
- data security
- automated verification
- bounded model checking
- access control mechanism
- network security
- network management
- security concerns
- ubiquitous computing environments
- security requirements
- symbolic model checking
- data mining
- model checker
- unauthorized access
- home network
- data processing
- information systems