Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Modelling and verification of dynamic role-based access control
KTH, School of Electrical Engineering and Computer Science (EECS), Theoretical Computer Science, TCS.
2018 (English)In: 12th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2018, Springer, 2018, Vol. 11181, p. 48-63Conference paper, Published paper (Refereed)
Abstract [en]

Controlling access to resources is essential for ensuring correctness of system functioning. Role-Based Access Control (RBAC) is a popular authorisation model that regulates the user’s rights to manage system resources based on the user’s role. In this paper, we extend the traditional static approach to defining RBAC and propose as well as formalise a dynamic RBAC model. It allows a designer to explicitly define the dependencies between the system states and permissions to access and modify system resources. To facilitate a systematic description and verification of the dynamic access rights, we propose a contract-based approach and then we demonstrate how to model and verify dynamic RBAC in Event-B. The approach is illustrated by a case study – a reporting management system. 

Place, publisher, year, edition, pages
Springer, 2018. Vol. 11181, p. 48-63
Series
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743
Keywords [en]
Artificial intelligence, Computer science, Computers, Access rights, Access to resources, Dynamic role-based, Management systems, Role-based Access Control, Static approach, System resources, System state, Access control
National Category
Embedded Systems
Identifiers
URN: urn:nbn:se:kth:diva-247463DOI: 10.1007/978-3-030-00359-3_4ISI: 000477758000004Scopus ID: 2-s2.0-85057323145ISBN: 9783030003586 (print)OAI: oai:DiVA.org:kth-247463DiVA, id: diva2:1302694
Conference
12th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2018; Grenoble; France; 26 September 2018 through 28 September 2018
Note

QC 20190405

Available from: 2019-04-05 Created: 2019-04-05 Last updated: 2019-08-09Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Troubitsyna, Elena

Search in DiVA

By author/editor
Troubitsyna, Elena
By organisation
Theoretical Computer Science, TCS
Embedded Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 4 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf