Meca: A Tool for Access Control Models

  • Amal Haddad
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4355)

Abstract

Access Control is a technique which insures security by preserving confidentiality and integrity of information. Meca (Models for access control) is a tool which generates, in a B machine, operational conditions that should be verified by an application to insure security.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bell, D.E., Lapadula, L.J.: Secure computer systems: A mathematical model. Technical report esd-tr-278, vol. 2, The Mitre Corporation, Bedford (1973)Google Scholar
  2. 2.
    Biba, K.J.: Integrity considerations for secure computer systems. Technical report tr-3153, The Mitre Corporation, Bedford (1997)Google Scholar
  3. 3.
    Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)Google Scholar
  4. 4.
    Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Science and Systems, pp. 437–443 (1971)Google Scholar
  5. 5.
    Marlet, R., Mesnil, C.: A demonstrative electronic purse -Card specification, pp. 1–53 (2002)Google Scholar
  6. 6.
    Sandhu, R.S.: Role hierarchies and constraints for lattice-bases access controls. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 65–79. Springer, Heidelberg (1996)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Amal Haddad
    • 1
  1. 1.LSR-IMAGGrenobleFrance

Personalised recommendations