Alcoa: the alloy constraint analyzer
Proceedings of the 22nd international conference on Software engineering
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
GEO-RBAC: a spatially aware RBAC
Proceedings of the tenth ACM symposium on Access control models and technologies
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
On spatio-temporal constraints and inheritance in role-based access control
Proceedings of the 2008 ACM symposium on Information, computer and communications security
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
XML-based policy specification framework for spatiotemporal access control
Proceedings of the 2nd international conference on Security of information and networks
A spatio-temporal role-based access control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
SiTra: simple transformations in Java
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Hi-index | 0.00 |
The recent advances in wireless networks, mobile applications and pervasive computing has prompted an urgent need for the creation of Access Control systems which takes into consideration the location of the user and the time of access. Such systems are even more complex than the conventional Access Control systems. Thus, the need arises for the analysis of the specification of such systems prior to the implementing of the systems. As a result, this paper proposes to use Alloy as a method of automated analysis of Spatio-temporal Role-Based Access Control models (STRBAC). To achieve this, this paper describes a method (AC2Alloy) that allows users to create STRBAC models and transforms them into the required Alloy code automatic, thus allowing for powerful analysis to take place using Alloy analyser utilizing SAT-Solvers. With the help of an example, we show how AC2Alloy convert STRBAC model to Alloy model and verify the resulting model using the Alloy analyser to identify an erroneous design.