dc.contributor.author |
Haraty, Ramzi A. |
|
dc.contributor.author |
Naous, Mirna |
|
dc.date.accessioned |
2018-02-01T10:01:18Z |
|
dc.date.available |
2018-02-01T10:01:18Z |
|
dc.date.copyright |
2013 |
en_US |
dc.date.issued |
2018-02-01 |
|
dc.identifier.isbn |
9781479937554 |
en_US |
dc.identifier.uri |
http://hdl.handle.net/10725/7010 |
|
dc.description.abstract |
Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. In this work, we focus on the security aspect of commercial security applications by exploring the nature and scope of the famous security policy - the Role Based Access Control Policy. We model it and check its consistency using the Alloy Analyzer. |
en_US |
dc.description.sponsorship |
IEEE Computer Society |
en_US |
dc.description.sponsorship |
IEEE Communications Society |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
IEEE |
en_US |
dc.subject |
Data transmission systems -- Congresses |
en_US |
dc.subject |
Telecommunication -- Data processing -- Congresses |
en_US |
dc.title |
Role-Based Access Control Modeling and Validation |
en_US |
dc.type |
Conference Paper / Proceeding |
en_US |
dc.author.school |
SAS |
en_US |
dc.author.idnumber |
199729410 |
en_US |
dc.author.department |
Computer Science and Mathematics |
en_US |
dc.description.embargo |
N/A |
en_US |
dc.publication.place |
Piscataway, NJ |
en_US |
dc.keywords |
Role Based Access Control Security Model |
en_US |
dc.keywords |
Consistency |
en_US |
dc.keywords |
Integrity |
en_US |
dc.description.bibliographiccitations |
Includes bibliographical references. |
en_US |
dc.identifier.doi |
http://dx.doi.org/10.1109/ISCC.2013.6754925 |
en_US |
dc.identifier.ctation |
Haraty, R. A., & Naous, M. (2013, July). Role-based access control modeling and validation. In Computers and Communications (ISCC), 2013 IEEE Symposium on (pp. 000061-000066). IEEE. |
en_US |
dc.author.email |
rharaty@lau.edu.lb |
en_US |
dc.conference.date |
7-10 July 2013 |
en_US |
dc.conference.place |
Split, Croatia |
en_US |
dc.conference.title |
2013 IEEE Symposium on Computers and Communications (ISCC 2013) |
en_US |
dc.identifier.tou |
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php |
en_US |
dc.identifier.url |
http://ieeexplore.ieee.org/abstract/document/6754925/ |
en_US |
dc.orcid.id |
https://orcid.org/0000-0002-6978-3627 |
en_US |
dc.publication.date |
2013 |
en_US |
dc.author.affiliation |
Lebanese American University |
en_US |