Timed automata as a formalism for expressing security: A survey on theory and practice

J Arcile, É André - ACM Computing Surveys, 2022 - dl.acm.org
Timed automata are a common formalism for the verification of concurrent systems subject to
timing constraints. They extend finite-state automata with clocks, that constrain the system …

Using hierarchical timed coloured petri nets in the formal study of TRBAC security policies

H Ben Attia, L Kahloul, S Benhazrallah… - International Journal of …, 2020 - Springer
Abstract Role-Based Access Control (RBAC) is one of the most used models in designing
and implementation of security policies, in large networking systems. Basic RBAC model …

Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model

R Abdunabi, M Al-Lail, I Ray… - IEEE Systems Journal, 2013 - ieeexplore.ieee.org
With the advent of wireless and mobile devices, many new applications are being
developed that make use of the spatio-temporal information of a user to provide better …

Security constraints in temporal role-based access-controlled workflows

C Combi, L Viganò, M Zavatteri - … of the Sixth ACM Conference on Data …, 2016 - dl.acm.org
Workflows and role-based access control models need to be suitably merged, in order to
allow users to perform processes in a correct way, according to the given data access …

An administrative model for collaborative management of ABAC systems and its security analysis

S Jha, S Sural, V Atluri, J Vaidya - 2016 IEEE 2nd International …, 2016 - ieeexplore.ieee.org
Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large
and federated enterprises due to its flexibility in expressing various types of security policies …

Security analysis of temporal RBAC under an administrative model

S Jha, S Sural, J Vaidya, V Atluri - Computers & security, 2014 - Elsevier
Security analysis of access control models is critical to confirm whether they ensure certain
security properties. Administrative models specify the rules for state transition for any given …

Security analysis of GTRBAC and its variants using model checking

S Mondal, S Sural, V Atluri - computers & security, 2011 - Elsevier
Security analysis is a formal verification technique to ascertain certain desirable guarantees
on the access control policy specification. Given a set of access control policies, a general …

Towards formal security analysis of GTRBAC using timed automata

S Mondal, S Sural, V Atluri - Proceedings of the 14th ACM Symposium …, 2009 - dl.acm.org
An access control system is often viewed as a state transition system. Given a set of access
control policies, a general safety requirement in such a system is to determine whether a …

Security analysis of unified access control policies

MP Singh, S Sural, V Atluri, J Vaidya - … 2019, Goa, India, December 21–22 …, 2020 - Springer
In the modern computing era, access to resources is often restricted through contextual
information and the attributes of users, objects and various other entities. Attribute-Based …

Specification and analysis of access control policies for mobile applications

R Abdunabi, I Ray, R France - Proceedings of the 18th acm symposium …, 2013 - dl.acm.org
Mobile applications allow individuals on-the-move access to resources" anytime, anywhere"
using hand-held mobile devices. We argue that for critical and sensitive resources this is …