APIs : Access Control Techniques to Analyze and Verify
نویسندگان
چکیده
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rules must be respected by software used in these sectors. The regulatory statements are somewhat informal and must be interpreted carefully in the software interface to private data. This paper describes techniques to formalize regulatory privacy rules and how to exploit this formalization to analyze the rules automatically. Our formalism, which we call privacy APIs, is an extension of access control matrix operations to include (1) operations for notification and logging and (2) constructs that ease the mapping between legal and formal language. We validate the expressive power of privacy APIs by encoding the 2000 and 2003 HIPAA consent rules in our system. This formalization is then encoded into Promela and we validate the usefulness of the formalism by using the SPIN model checker to verify properties that distinguish the two versions of HIPAA.
منابع مشابه
A combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملAnalysis of Packet Loss and Latency Control for Robust IPTV over Mobile WiMAX and LTE Assessment (RESEARCH NOTE)
Abstract The streamed audio video (AV) content for IPTV across mobile WiMAX channel, the different schemes were discussed to reduce the noise, packet loss and latency. The objective of this paper is to verify the effectiveness of forward error correction (FEC) techniques and to suggest the techniques for robustness problems and to analysis the issues either due to AV coding encoding or due to...
متن کاملA Graph-based Concurrency Control Protocol for Xml Metadata Knowledge Bases
Providing efficient access for XML APIs in XML metadata knowledge bases (XMKBs) is crucial, since XML is widely used to integrate data in XMKBs. In XMKBs, the types, contents and locations of heterogeneous data are illustrated in XML documents to provide a uniform interface for users to manipulate this data. As users update and query information about this heterogeneous data, the XML documents ...
متن کاملExplanation of functional factors affecting the success of public spaces and providing a model for assessing success through its functional dimension (Case study: Imam Khomeini Street, Tabriz, Iran)
The condition that varieties of cities including Iranian cities are confronted makes the creation of successful public space a necessity. It is clear that for creating suitable public space first we should understand the influencing factors on space and simultaneously solve and improve the problems through understanding the environment. For achieving the factors that influence the success as a ...
متن کاملAccess control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کامل