Formal verification for access control in web information sharing system

Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.

Original languageEnglish
Title of host publicationAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
Pages80-89
Number of pages10
DOIs
Publication statusPublished - Nov 9 2009
Event3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, Korea, Republic of
Duration: Jun 25 2009Jun 27 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5576 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Information Security and Assurance, ISA 2009
CountryKorea, Republic of
CitySeoul
Period6/25/096/27/09

Fingerprint

Information Sharing
Formal Verification
Access Control
Access control
Predicate Logic
First-order Logic
Web Application
Social Networks
Defects
Formal verification

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Sakai, A., Hori, Y., & Sakurai, K. (2009). Formal verification for access control in web information sharing system. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings (pp. 80-89). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS). https://doi.org/10.1007/978-3-642-02617-1_9

Formal verification for access control in web information sharing system. / Sakai, Akihiro; Hori, Yoshiaki; Sakurai, Kouichi.

Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 80-89 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sakai, A, Hori, Y & Sakurai, K 2009, Formal verification for access control in web information sharing system. in Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5576 LNCS, pp. 80-89, 3rd International Conference on Information Security and Assurance, ISA 2009, Seoul, Korea, Republic of, 6/25/09. https://doi.org/10.1007/978-3-642-02617-1_9
Sakai A, Hori Y, Sakurai K. Formal verification for access control in web information sharing system. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 80-89. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-02617-1_9
Sakai, Akihiro ; Hori, Yoshiaki ; Sakurai, Kouichi. / Formal verification for access control in web information sharing system. Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. pp. 80-89 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{a737090952cb414fba101aef0bb0ae5d,
title = "Formal verification for access control in web information sharing system",
abstract = "When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.",
author = "Akihiro Sakai and Yoshiaki Hori and Kouichi Sakurai",
year = "2009",
month = "11",
day = "9",
doi = "10.1007/978-3-642-02617-1_9",
language = "English",
isbn = "3642026168",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "80--89",
booktitle = "Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings",

}

TY - GEN

T1 - Formal verification for access control in web information sharing system

AU - Sakai, Akihiro

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2009/11/9

Y1 - 2009/11/9

N2 - When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.

AB - When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.

UR - http://www.scopus.com/inward/record.url?scp=70350626823&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350626823&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-02617-1_9

DO - 10.1007/978-3-642-02617-1_9

M3 - Conference contribution

AN - SCOPUS:70350626823

SN - 3642026168

SN - 9783642026164

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 80

EP - 89

BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings

ER -