Lightweight analysis of access control models with description logic
Tóm tắt
Từ khóa
Tài liệu tham khảo
Baader F, Diego Calvanese DM, Nardi D, Patel-Schneider P (2003) The description logic handbook. Cambridge University Press, London
Basin D, Clavel M, Doser J, Egea M (2009) Automated analysis of security-design models. Inf Softw Technol 51(5): 815–831. doi:10.1016/j.infsof.2008.05.011
Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39–91 http://doi.acm.org/10.1145/1125808.1125810
Berardi D, Calvanese D, Giacomo GD (2005) Reasoning on UML class diagrams. Artificial Intelligence 168: 70–118. doi:10.1016/j.artint.2005.05.003
Braga C (2008) From access control policies to aspect code: a metamodel-based approach. In: Chaudron MRV (eds) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008). Workshops and Symposia at MODELS 2008, 28 Sept–3 Oct 2008, Toulouse, France. Lecture notes on computer science, vol 5421. Springer, Berlin, pp 243–256. doi:10.1007/978-3-642-01648-6_26
Brucker AD, Doser J, Wolff B (2006) A model transformation semantics and analysis methodology for Secure UML. In: Nierstrasz O, Whittle J, Harel D, Reggio G (eds) Proceedings of the 9th international conference on model driven engineering languages and systems, Genova, Italy, 1–6 Oct. Lecture notes on computer science, vol 4199. Springer, Berlin, pp 306–320
Chae JH, Shiri N (2007) Description logic framework for access control and security in object-oriented systems. In: RSFDGrC ’07. Proceedings of the 11th international conference on rough sets, fuzzy sets, data mining and granular computing. Springer, Berlin, pp 565–573. doi:10.1007/978-3-540-72530-5_68
Clavel M, de Dios MAG, Egea M (2008) ArgoESS. http://maude.sip.ucm.es/eos
Clavel M, da Silva V, Braga C, Egea M (2008) Model-driven security in practice: an industrial experience. In: Proceedings of ECMDA 2008. Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9–12 June, vol 5095. Springer, Berlin. doi:10.1007/978-3-540-69100-6_22
Clavel M, Egea M, de Dios MAG (2009) Checking unsatisfiability for OCL constraints. In: Proceedings of 9th OCL 2009 workshop at the UML/MoDELS conferences: the pragmatics Of OCL and other textual specification languages (accepted for publication)
Faghih F, Amini M, Jalili R (2009) A temporal description logic based access control model for expressing history constrained policies in semantic web. Policies for distributed systems and networks. In: IEEE International Workshop on 0:142–149. http://doi.ieeecomputersociety.org/10.1109/POLICY.2009.15
Ferraiolo DF, Kuhn DR, Chandramouli R (2007) Role-based access control, 2nd edn. Artech House Publishers, Norwood, MA, USA
Goldblatt R (1987) Logics of time and computation, 2nd edn. In: CSLI Lecture Notes, vol 7. Center for the Study of Language and Information
Juerjens J (2003) Secure systems development with UML. Springer, Berlin
Shields B, Molloy O (2007) Using description logic and rules to determine xml access control. In: DEXA ’07. Proceedings of the 18th international conference on database and expert systems applications. IEEE Computer Society, Washington, DC, USA, pp 718–724. doi:10.1109/DEXA.2007.147
Warmer J, Kleppe A (2003) The Object constraint language, 2nd edn. Addison-Wesley, Reading