Reconstructing a formal security model
نویسندگان
چکیده
منابع مشابه
Reconstructing a formal security model
Role-based access control (RBAC) is a flexible approach to access control, which has generated great interest in the security community. The principal motivation behind RBAC is to simplify the complexity of administrative tasks. Several formal models of RBAC have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily und...
متن کاملA short introduction to two approaches in formal verification of security protocols: model checking and theorem proving
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all different behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this...
متن کاملA Formal Security Model of a Smart Card Web Server
Smart card Web server provides a modern interface between smart cards and the external world. It is of paramount importance that this new software component does not jeopardize the security of the smart card. This paper presents a formal model of the smart card Web server specification and the proof of its security properties. The formalization enables a thoughtful analysis of the specification...
متن کاملA Formal Specification of the MIDP 2.0 Security Model
This paper presents, to the best of our knowledge, the first formal specification of the application security model defined by the Mobile Information Device Profile 2.0 for Java 2 Micro Edition. The specification, which has been formalized in Coq, provides an abstract representation of the state of a device and the security-related events that allows to reason about the security properties of t...
متن کاملA Formal Model for the Grid Security Infrastructure
The Grid Security Infrastructure (GSI) proposed and implemented in Globus Toolkit has been a widely accepted solution for the security of grids in recent years. But there is no formal analysis or modelling on security mechanisms of GSI emerging in the literature yet. In this paper, we propose a formal logic, and formalize those primary security mechanisms using the logic. Our formalism not only...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information and Software Technology
سال: 2002
ISSN: 0950-5849
DOI: 10.1016/s0950-5849(02)00092-7