Timed automata as a formalism for expressing security: A survey on theory and practice
J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …
timing constraints. They extend finite-state automata with clocks, that constrain the system …
Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies
Abstract Role-Based Access Control (RBAC) is one of the most used models in designing
and implementation of security policies, in large networking systems. Basic RBAC model …
and implementation of security policies, in large networking systems. Basic RBAC model …
Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model
With the advent of wireless and mobile devices, many new applications are being
developed that make use of the spatio-temporal information of a user to provide better …
developed that make use of the spatio-temporal information of a user to provide better …
Security constraints in temporal role-based access-controlled workflows
Workflows and role-based access control models need to be suitably merged, in order to
allow users to perform processes in a correct way, according to the given data access …
allow users to perform processes in a correct way, according to the given data access …
An administrative model for collaborative management of ABAC systems and its security analysis
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …
and federated enterprises due to its flexibility in expressing various types of security policies …
Security analysis of temporal RBAC under an administrative model
Security analysis of access control models is critical to confirm whether they ensure certain
security properties. Administrative models specify the rules for state transition for any given …
security properties. Administrative models specify the rules for state transition for any given …
Security analysis of GTRBAC and its variants using model checking
Security analysis is a formal verification technique to ascertain certain desirable guarantees
on the access control policy specification. Given a set of access control policies, a general …
on the access control policy specification. Given a set of access control policies, a general …
Towards formal security analysis of GTRBAC using timed automata
An access control system is often viewed as a state transition system. Given a set of access
control policies, a general safety requirement in such a system is to determine whether a …
control policies, a general safety requirement in such a system is to determine whether a …
Security analysis of unified access control policies
In the modern computing era, access to resources is often restricted through contextual
information and the attributes of users, objects and various other entities. Attribute-Based …
information and the attributes of users, objects and various other entities. Attribute-Based …
Specification and analysis of access control policies for mobile applications
Mobile applications allow individuals on-the-move access to resources" anytime, anywhere"
using hand-held mobile devices. We argue that for critical and sensitive resources this is …
using hand-held mobile devices. We argue that for critical and sensitive resources this is …