Generating Monitors for Usage Control

نویسنده

  • Frederik Deckwerth
چکیده

Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a model driven approach to solve this problem based on graph transformation. Using the precise semantics of graph transformation, access control models and policies can be formally analyzed in an early phase. The existing solutions on automated verification and efficient implementation of graph transformation show that this approach is suitable to address security concerns throughout the overall software development process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monitors for Usage Control

Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.

متن کامل

Electromagnetic Radiofrequency Radiation Emitted from GSM Mobile Phones Decreases the Accuracy of Home Blood Glucose Monitors

Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, ho...

متن کامل

A Petri-net Model for Operational Cycle in SCADA Systems

Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...

متن کامل

A virtualized usage control bus system

Usage control is an extension of access control that additionally defines what must and must not happen to data after access has been granted. The process of enforcing usage control requirements on data must take into account all the different representations that the data may assume at different levels of abstraction (e.g. file, window content, network packet). Therefore, multiple data flow tr...

متن کامل

بررسی شدت میدان های مغناطیسی و الکتریکی اطراف رایانه های مورد استفاده و تاثیر آن بر سلامت کاربران

Background and aimsIntensity of Magnetic and Electric fields around visual displayterminals and its association on health effects were studied.Methodsmagnetic and electric fields intensities around 237 VDTs at distances 30¡50¡ 60 cm and different operating conditions (active¸ screen saver¸ shut down) with use of HI-3603 device  according to Svensk standard method were monitored. Resultsmagnetic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013