A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies

N/ACitations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Our research works are in the context of verifying the integrity of access control policies in relational database management systems. This paper addresses the following question: In terms of security and particularly access control, does an information system actually do what was planned for it to do? Thus, an important aspect is to help security architects verifying the correspondence between the security planning and its real implementation. We present a synthesis of the problem of access control policy integrity within relational databases. Then, we introduce our proposal for addressing this issue. We especially focus on the verification and validation of the conformity of concrete role based access control policies in a formal environment. Finally, we illustrate the relevance of our contribution through a case of study.

Cite

CITATION STYLE

APA

Jaidi, F., & Ayachi, F. L. (2015). A formal approach based on verification and validation techniques for enhancing the integrity of concrete role based access control policies. In Advances in Intelligent Systems and Computing (Vol. 369, pp. 53–64). Springer Verlag. https://doi.org/10.1007/978-3-319-19713-5_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free