Formal verification for access control in web information sharing system

Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.

Original languageEnglish
Title of host publicationAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
Pages80-89
Number of pages10
DOIs
Publication statusPublished - Nov 9 2009
Event3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, Korea, Republic of
Duration: Jun 25 2009Jun 27 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5576 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Information Security and Assurance, ISA 2009
CountryKorea, Republic of
CitySeoul
Period6/25/096/27/09

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Formal verification for access control in web information sharing system'. Together they form a unique fingerprint.

  • Cite this

    Sakai, A., Hori, Y., & Sakurai, K. (2009). Formal verification for access control in web information sharing system. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings (pp. 80-89). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS). https://doi.org/10.1007/978-3-642-02617-1_9