Entry Ahmed:2007:SVS from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Ahmed:2007:SVS,
  author =       "Tanvir Ahmed and Anand R. Tripathi",
  title =        "Specification and verification of security
                 requirements in a programming model for decentralized
                 {CSCW} systems",
  journal =      j-TISSEC,
  volume =       "10",
  number =       "2",
  pages =        "7:1--7:??",
  month =        may,
  year =         "2007",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1237500.1237503",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:05 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We present, in this paper, a role-based model for
                 programming distributed CSCW systems. This model
                 supports specification of dynamic security and
                 coordination requirements in such systems. We also
                 present here a model-checking methodology for verifying
                 the security properties of a design expressed in this
                 model. The verification methodology presented here is
                 used to ensure correctness and consistency of a design
                 specification. It is also used to ensure that sensitive
                 security requirements cannot be violated when policy
                 enforcement functions are distributed among the
                 participants. Several aspect-specific verification
                 models are developed to check security properties, such
                 as task-flow constraints, information flow,
                 confidentiality, and assignment of administrative
                 privileges.",
  acknowledgement = ack-nhfb,
  articleno =    "7",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "finite state-based model checking; methodology for
                 access-control policy design; role-based access
                 control; Security policy specification",
}

Related entries