Static verification of security requirements in role based CSCW systems

Tanvir Ahmed, Anand R. Tripathi

Research output: Contribution to conferencePaperpeer-review

60 Scopus citations

Abstract

In this paper, we present static verification of security requirements for CSCW systems using finite-state techniques, i.e., model checking. The coordination and security constraints of CSCW systems are specified using a role based collaboration model. The verification ensures completeness and consistency of the specification given global requirements. We have developed several verification models to check security properties, such as task-flow constraints, information flow or confidentiality, and assignment of administrative privileges. The primary contribution of this paper is a methodology for verification of security requirements during designing collaboration systems.

Original languageEnglish (US)
Pages196-203
Number of pages8
DOIs
StatePublished - 2003
EventProceedings of Eighth ACM Symposium on Access Control Models and Technologies - Villa Gallia, Como, Italy
Duration: Jun 2 2003Jun 3 2003

Other

OtherProceedings of Eighth ACM Symposium on Access Control Models and Technologies
Country/TerritoryItaly
CityVilla Gallia, Como
Period6/2/036/3/03

Keywords

  • Finite-state based model checking
  • Methodology for access control policy design
  • Role based access control
  • Security policy specification

Fingerprint

Dive into the research topics of 'Static verification of security requirements in role based CSCW systems'. Together they form a unique fingerprint.

Cite this