Abstract
In this paper, we present static verification of security requirements for CSCW systems using finite-state techniques, i.e., model checking. The coordination and security constraints of CSCW systems are specified using a role based collaboration model. The verification ensures completeness and consistency of the specification given global requirements. We have developed several verification models to check security properties, such as task-flow constraints, information flow or confidentiality, and assignment of administrative privileges. The primary contribution of this paper is a methodology for verification of security requirements during designing collaboration systems.
Original language | English (US) |
---|---|
Pages | 196-203 |
Number of pages | 8 |
DOIs | |
State | Published - 2003 |
Event | Proceedings of Eighth ACM Symposium on Access Control Models and Technologies - Villa Gallia, Como, Italy Duration: Jun 2 2003 → Jun 3 2003 |
Other
Other | Proceedings of Eighth ACM Symposium on Access Control Models and Technologies |
---|---|
Country/Territory | Italy |
City | Villa Gallia, Como |
Period | 6/2/03 → 6/3/03 |
Keywords
- Finite-state based model checking
- Methodology for access control policy design
- Role based access control
- Security policy specification