Blog
About

133
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Using Timed Colored Petri Nets and CPN-tool to Model and Verify TRBAC Security Policies

      , ,

      Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010) (VECOS)

      Verification and Evaluation of Computer and Communication Systems (VECoS 2010)

      1-2 July 2010

      Security Policies, RBAC model, TRBAC, Timed Colored Petri Nets, Formal Modelling, Formal Verification

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Role Based Access Control (RBAC) is one of the most used models in designing and implementation of security policies in large networking systems. The classical model doesn’t consider temporal aspects which are so important in such policies. Temporal RBAC (TRBAC) is proposed to deal with these aspects. Although the elegance of these models, design a security policy remains a challenge. One is obliged to prove the consistency and the correctness of the policy. Using formal verification allows proving that the designed policy is consistent. In this paper1, we present a formal modelling/analysis approach for TRBAC policies. We use Timed Colored Petri Nets to model the TRBAC policy, and then CPN-tool is used to analyze the generated models. The analysis allows proving many important properties about the TRBAC security policy.

          Related collections

          Most cited references 11

          • Record: found
          • Abstract: not found
          • Article: not found

          A generalized temporal role-based access control model

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            An introduction to the theoretical aspects of Coloured Petri Nets

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Petri Nets and their Application an Introduction

               Tadao Murata (1984)
                Bookmark

                Author and article information

                Contributors
                Conference
                July 2010
                July 2010
                : 1-12
                Affiliations
                LISSI Laboratory,

                Paris Est University,

                Paris, France.

                Computer Science Departement,

                Biskra University, Algeria,
                LISSI Laboratory,

                Paris Est University

                Paris, France.

                F’SATI at TUT,

                Pretoria South Africa.
                LISSI Laboratory,

                Paris Est University

                Paris, France.
                Article
                10.14236/ewic/VECOS2010.8
                © Laïd Kahloul et al. Published by BCS Learning and Development Ltd. Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010), Paris, France

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010)
                VECOS
                4
                Paris, France
                1-2 July 2010
                Electronic Workshops in Computing (eWiC)
                Verification and Evaluation of Computer and Communication Systems (VECoS 2010)
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article