Generating Monitors for Usage Control
نویسنده
چکیده
Protecting computational resources and digital information against unauthorized access is one of the fundamental security requirements in modern computer systems. Usage control addresses the control of computational resources after access has been granted. Despite its fundamental importance, no systematic methods exist to implement formal usage control specifications. This paper presents a model driven approach to solve this problem based on graph transformation. Using the precise semantics of graph transformation, access control models and policies can be formally analyzed in an early phase. The existing solutions on automated verification and efficient implementation of graph transformation show that this approach is suitable to address security concerns throughout the overall software development process.
منابع مشابه
Monitors for Usage Control
Distributed usage control is concerned with controlling how data may or may not be used after it has been given away. One strategy for enforcing usage control requirements is based on monitoring data usage and reacting to policy violations by imposing penalties. We show how to implement monitors for usage control requirements using runtime verification technology.
متن کاملElectromagnetic Radiofrequency Radiation Emitted from GSM Mobile Phones Decreases the Accuracy of Home Blood Glucose Monitors
Mobile phones are two-way radios that emit electromagnetic radiation in microwave range. As the number of mobile phone users has reached 6 billion, the bioeffects of exposure to mobile phone radiation and mobile phone electromagnetic interference with electronic equipment have received more attention, globally. As self-monitoring of blood glucose can be a beneficial part of diabetes control, ho...
متن کاملA Petri-net Model for Operational Cycle in SCADA Systems
Supervisory control and data acquisition (SCADA) system monitors and controls industrial processes in critical infrastructures (CIs) and plays the vital role in maintaining the reliability of CIs such as power, oil, and gas system. In fact, SCADA system refers to the set of control process, which measures and monitors sensors in remote substations from a control center. These sensors usually ha...
متن کاملA virtualized usage control bus system
Usage control is an extension of access control that additionally defines what must and must not happen to data after access has been granted. The process of enforcing usage control requirements on data must take into account all the different representations that the data may assume at different levels of abstraction (e.g. file, window content, network packet). Therefore, multiple data flow tr...
متن کاملبررسی شدت میدان های مغناطیسی و الکتریکی اطراف رایانه های مورد استفاده و تاثیر آن بر سلامت کاربران
Background and aimsIntensity of Magnetic and Electric fields around visual displayterminals and its association on health effects were studied.Methodsmagnetic and electric fields intensities around 237 VDTs at distances 30¡50¡ 60 cm and different operating conditions (active¸ screen saver¸ shut down) with use of HI-3603 device according to Svensk standard method were monitored. Resultsmagnetic...
متن کامل