Abstract
The UCON A usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a formal verification tool, the SPIN model checker, for verifying the correctness of the concurrent usage control implementation. We also provide an illustrative case study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Park, J., Sandhu, R.: The UCON ABC usage control model. ACM Transactions on Information and System Security 7(1), 128–174 (2004)
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Transactions on Information and System Security 8(4), 351–387 (2005)
Zhang, X., Sandhu, R.: Safety analysis of usage control authorization models. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, pp. 243–254 (2006)
Wing, J.M.: A symbiotic relationship between formal methods and security. In: Proceedings of the Computer Security, Dependability and Assurance: From Needs to Solutions, York, UK, pp. 26–38 (1998)
Naldurg, P., Schwoon, S., Rajamani, S., Lambert, J.: NETRA: Seeing through access control. In: The 4th ACM Workshop on Formal Methods in Security Engineering, Fairfax, Virginia, pp. 55–66 (2006)
Guelev, D.P., Ryan, M., Schobbens, P.: Model checking access control policies. In: Proceedings of the Seventh Information Security Conference, Palo Alto, USA, pp. 219–230 (2004)
Zhang, N., Guelev, D.P., Ryan, M.: Synthesising verified access control systems through model checking. Journal of Computer Security 16(1), 1–6 (2007)
Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: Proceedings of the 16th ACM International Conference on World Wide Web, New York, USA, pp. 667–676 (2007)
Pretschner, A., Hilty, M., Basin, D., Schaefer, C., Walter, T.: Mechanisms for usage control. In: ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan, pp. 240–244 (2008)
Janicke, H., Cau, A., Siewe, F., Zedan, H.: Concurrent enforcement of usage control policies. In: Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, Palisades, NY, USA, pp. 111–118 (June 2008)
Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Software verification with blast. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol. 2648, pp. 235–239. Springer, Heidelberg (2003)
Chaki, S., Clarke, E., Groce, A., Jha, S., Veith, H.: Modular verification of software components in c. IEEE Transactions on Software Engineering 30(6), 388–402 (2004)
Holzmann, G.J.: The model checker spin. IEEE Trans. on Software Engineering 23, 279–295 (1997)
Cimatti, A., Clarke, E., Giunchiglia, F., Roveri, M.: Nusmv: A new symbolic model verifier. In: Proceedings of the 11th International Conference on Computer Aided Verification,Trento, Italy, pp. 495–499 (1996)
Lffer, S., Serhrouchni, A.: Creating implementations from promela models. In: Proceedings of Second SPIN Workshop, New Jersey, USA (1996)
Rajkumar, P.V., Ghosh, S.K., Dasgupta, P.: An end to end correctness verification approach for application specific usage control. In: Proceedings of the Fourth IEEE International Conference on Industrial and Information Systems, pp. 122–136 (December 2009)
Rajkumar, P.V., Ghosh, S.K., Dasgupta, P.: Application specific usage control implementation verification. International Journal of Network Security and Its Applications 1(3), 116–128 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rajkumar, P.V., Ghosh, S.K., Dasgupta, P. (2010). Concurrent Usage Control Implementation Verification Using the SPIN Model Checker. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds) Recent Trends in Network Security and Applications. CNSA 2010. Communications in Computer and Information Science, vol 89. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14478-3_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-14478-3_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-14477-6
Online ISBN: 978-3-642-14478-3
eBook Packages: Computer ScienceComputer Science (R0)