Formal Methods and Access Control

نویسنده

  • Michael Huth
چکیده

Related Concepts – Access-control architectures – Formal verification – Identity management – Model-based development – Policy languages – Security policies Definition A formal method is any technique or method that aids in the construction and validation of computer-based systems and is based, in total or in part, on rigorous mathematics. Access control [8] refers to any method or mechanism by which the access of principals to resources is regulated; formal methods can aid considerably in the design, validation, and implementation of access control.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Determinants of Credit Access by Small Scale Farmers in Dekina Local Government Area of Kogi State, Nigeria

This study is on the determinants of credit access by small scale farmers in Dekina Local Government Area of Kogi State, Nigeria. The specific objectives are to; identify the major source of credit among the small scale farmers; estimate the determinants of farmers’ access to formal credit; compare the farm income of farmers who have access to formal credit and those who have not and identify c...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Formal Specification and Verification of Control Software for

Microprocessor-based systems are increasingly being used to provide improved security. The t c improvements in security are often accomplished at the cost of increased complexity, as when a smar ard microprocessor replaces a simple password system for network access control. Formal methods l m are recognized as an effective means of assuring the security of systems, and have been used in severa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011