Abstract:
Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the security aspect of commercial security applications by exploring the nature and scope of the famous security policy - the Role Based Access Control Policy. We model it and check its consistency using the Alloy Analyzer.
Citation:
Haraty, R. A., & Naous, M. (2013, July). Role-based access control modeling and validation. In Computers and Communications (ISCC), 2013 IEEE Symposium on (pp. 000061-000066). IEEE.