The Community for Technology Leaders
Green Image
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to various domains such as health care industry, digital government, and financial service institutes requiring that different security requirements must be fulfilled. Authorisation constraints can help the policy architect design and express higher-level organisational rules. Although the importance of authorisation constraints has been addressed in the literature, there does not exist a systematic way to verify and validate authorisation constraints. In this paper, we specify both non-temporal and history-based authorisation constraints in the Object Constraint Language (OCL) and first-order linear temporal logic (LTL). Based upon these specifications, we attempt to formally verify role-based access control policies with the help of a theorem prover and to validate policies with the USE system, a validation tool for OCL constraints. We also describe an authorisation engine, which supports the enforcement of authorisation constraints.
Access controls, Protection mechanisms

K. Sohr, M. Gogolla, M. Drouineaud and G. Ahn, "Analyzing and Managing Role-Based Access Control Policies," in IEEE Transactions on Knowledge & Data Engineering, vol. 20, no. , pp. 924-939, 2008.
92 ms
(Ver 3.3 (11022016))