Coloured Petri Nets: a high level language for system design and analysis
APN 90 Proceedings on Advances in Petri nets 1990
Network flows: theory, algorithms, and applications
Network flows: theory, algorithms, and applications
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Formal specification for role based access control user/role and role/role relationship management
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
Providing Security and Interoperation of HeterogeneousSystems
Distributed and Parallel Databases - Security of data and transaction processing
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Temporal hierarchies and inheritance semantics for GTRBAC
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Dynamic access control through Petri net workflows
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Verifying Enterprise 's Mandatory Access Control Policies with Coloured Petri Nets
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
An Approach for Modeling and Analysis of Security System Architectures
IEEE Transactions on Knowledge and Data Engineering
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
WORDS '05 Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
IEEE Transactions on Knowledge and Data Engineering
Analyzing Security Interoperability during Component Integration
ICIS-COMSAR '06 Proceedings of the 5th IEEE/ACIS International Conference on Computer and Information Science and 1st IEEE/ACIS International Workshop on Component-Based Software Engineering,Software Architecture and Reuse
Modeling Chinese Wall Policy Using Colored Petri Nets
CIT '06 Proceedings of the Sixth IEEE International Conference on Computer and Information Technology
Verification of Strict Integrity Policy via Petri Nets
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
Deadlock-Free Design of JSP with Multi-Resource Sharing
ICCEE '08 Proceedings of the 2008 International Conference on Computer and Electrical Engineering
Security Violation Detection for RBAC Based Interoperation in Distributed Environment
IEICE - Transactions on Information and Systems
Specification and enforcement of flexible security policy for active cooperation
Information Sciences: an International Journal
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
ICATPN'00 Proceedings of the 21st international conference on Application and theory of petri nets
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Activity-oriented access control to ubiquitous hospital information and services
Information Sciences: an International Journal
Flexible secure inter-domain interoperability through attribute conversion
Information Sciences: an International Journal
Policy analysis for Administrative Role-Based Access Control
Theoretical Computer Science
Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
IEEE Transactions on Dependable and Secure Computing
Property-preserving Petri Net Process Algebra in Software Engineering
Property-preserving Petri Net Process Algebra in Software Engineering
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Analysis of the Petri net model of parallel manufacturing processes with shared resources
Information Sciences: an International Journal
Fuzzy colored time Petri net and termination analysis for fuzzy Event-Condition-Action rules
Information Sciences: an International Journal
Hi-index | 0.07 |
In a multi-domains application environment, distributed multiple organizations interoperate with each other. The local access control policies should correspondingly be integrated together in order to allow users of one domain to interact with each others. One of the key challenges of integrating policies is conflict detection and resolution while preserving policy consistency. This paper addresses several types of potential conflicts and consistency properties with a systematic and rigorous approach: graph theory, network flow technology and colored Petri nets are applied for specifying and verifying a secure interoperation design. The component-based integration of policies is applicable for both static and dynamic multi-domains environments.