Dynamic Analysis of Usage Control Policies
Yehia Elrakaiby, Jun Pang
2014
Abstract
Usage control extends access control by enabling the specification of requirements that should be satisfied before, while and after access. To ensure that the deployment of usage control policies in target domains achieves the required security goals, policy verification and analysis tools are needed. In this paper, we present an approach for the dynamic analysis of usage control policies using formal descriptions of target domains and their usage control policies. Our approach provides usage control management explicit labeled transition system semantics and enables the automated verification of usage control policies using model checking.
DownloadPaper Citation
in Harvard Style
Elrakaiby Y. and Pang J. (2014). Dynamic Analysis of Usage Control Policies . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 88-100. DOI: 10.5220/0005046600880100
in Bibtex Style
@conference{secrypt14,
author={Yehia Elrakaiby and Jun Pang},
title={Dynamic Analysis of Usage Control Policies},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={88-100},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005046600880100},
isbn={978-989-758-045-1},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Dynamic Analysis of Usage Control Policies
SN - 978-989-758-045-1
AU - Elrakaiby Y.
AU - Pang J.
PY - 2014
SP - 88
EP - 100
DO - 10.5220/0005046600880100