Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs

Size: px
Start display at page:

Download "Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs"

Transcription

1 Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs Romuald Thion and Stéphane Coulondre LIRIS: Lyon Research Center for Images and Intelligent Information Systems, Bâtiment Blaise Pascal (501), 20, avenue Albert Einstein, Villeurbanne Cedex, France Abstract. This paper focuses on two aspects of access control: graphical representation and reasoning. Access control policies describe which operations are granted to which users, w.r.t. some resources. The Rolebased access control introduces the concept of role to model user permissions. Currently, there is a need for tools allowing security officers to graphically describe and reason on their policies. Thanks to conceptual graphs, we can provide a consistent graphical formalism for role-based access control policies, which is able to deal with particular features such as role hierarchy and constraints. Moreover, once a policy is modelled by CGs, graph rules and inference procedures can be used to reason on it; This allows security officers to understand why some permissions are granted or not and to detect whether integrity constraints are violated. 1 Introduction Opening our information systems to the world-wide web is really seducing, but highlights a problem which becomes more and more crucial: security. Nowadays, every on-line computer must be equipped with security update agent, firewall, anti-virus software and even anti-spyware, otherwise within a few minutes information system can become the target of automated scanning scripts, hackers, malicious websites, etc.: security is now of main importance. In this paper, we are dealing with a particular aspect of security process: access control. 1.1 Reasoning on access control policies Access control denotes the fact of determining whether a user (process, computer, human user, etc.) is able to perform an operation (read, write, execute, delete, search, etc.) on an resource (a tuple in a database, a table, an object, a file, etc.). An operation right on a resource is called permission. Access control policies describes define the users rights on resources, in order to enforce security of an organization. As a matter of fact, a large part of flaws in information systems are due to administration mistakes or security misconceptions: the number of users is increasing, rules are more and more complex, constraints are introduced to deal

2 2 with border-line cases. As policy engineering is considered to be of high pratical importance [4], we do think there is a need for tools facilitating design and maintenance of security policies, to avoid mistakes and misconceptions. Such tools need to meet several requirements: have an appropriate graphical interface, be able to capture access control model mechanisms and constrainted policies, be able to check consistency of policies, be able to answer queries for particular permissions or relation holdings in the policies, have comprehensible inference mechanism, even by non-logicians. According to [5], we do think that such functionnalities cannot be designed without a proper formal framework. 1.2 Why conceptual graphs? Rather than tailoring a dedicated fragment of first-order logic [6](FOL) or using a pure logic-based approach [5, 4] with traditional resolution methods (such as Robinson principle), we focused on conceptual graphs (CGs) and their dedicated inference procedures. The CGs framework meets the requirements described in section 1.1: CGs is a formal system (using the function Φ gives a straight equivalence in FOL), the CGs support can model complex structures such as hierarchies, individual markers and graph rules are expressive engough to capture authorization mechanisms of access control models, chaining procedures allow direct graphical-based inferences on graphs. This paper presents how to use the conceptual graphs framework to design and infer on Role-Based Access Control (RBAC) policies. CGs applied on RBAC allow graphical representation of policies and graph rules inferences can capture underlying authorization mechanisms and allows reasoning on policies. 2 Fundamentals 2.1 Role Based-Access Control Policies Role-Based Access Control models constitute a family in which permissions are associated with roles (roles can be seen as collections of permissions), and users are made members of appropriate roles. The definition of a role is quoted from [12]: A role is a job function or job title within the organization with some associated semantics regarding the authority and responsibility conferred on a member of the role.

3 3 Figure 1 is common representation of the RBAC model. In this figure, URA is a short for user-role assignment and PRA for permission-role assignment. In the RBAC model, permissions are not directly assigned to users. Thus, access to a resource is granted to a user if he/she endorses a role which is assigned to this permission. The role hierarchy is a way of minimizing the number of roles in RBAC policies: a role specializing another one inherits all its permissions. As the major part of access control decisions is based on user functions or jobs, the introduction of roles greatly simplifies policies management. Since roles in an organization are usually stable with respect to users turnover and tasks reassignment, RBAC provides a powerful mechanism for reducing complexity, cost, and mistakes sometimes entailed by permission management [1]. RBAC was found to be among the most attractive solutions for providing access control in e-commerce, e-government or e-health, and is also a very active research field. However, organizations may involve thousands of roles [10] and administration of RBAC policies can still be complex. Graphical based modelling and reasoning is a step beyond easy-to-use policy administration interfaces and better comprehension of policies. Fig. 1. RBAC Model (no specific formalism) 2.2 Representation and reasoning with conceptual graphs The following definitions are quoted from [11]. A rule R : G 1 G 2 is composed of two CGs G 1 and G 2, respectively called hypothesis and conclusion. There may be co-reference links between concepts of G 1 and G 2. There are no constraints on types for individual markers common to G 1 and G 2 : the type considered in operations is the smallest type that can be associated with the marker. We call a support the structure that represents the ontology for a specific domain application, it is composed a concept type lattice and a relation type set. A knowledge base is composed of a support S, a set of simple CGs (facts), and a set of rules.

4 4 Forward chaining is typically used in order to enrich knowledge base with new facts, implicitly present in the base [11]. It is used to prove a goal graph G goal is implied by a knowledge base KB. Main idea is to calculate the closure of the set of facts of KB by the set of rules of KB. Basic outline of procedure is: chose a rule R from KB, let be G a fact from KB. If G fullfills the hypothesis of R, then the conclusion of R can be added to KB, if it is not already present (to avoid redundant informations), repeat until no new facts can be produced, if there exists a projection from G goal to facts from KB, then G goal is implied by the knowledge base. This knowledge addition principle is the graph dual of bottom-up resolution approach in first-order logic. Backward chaining is typically used to find a linear resolution of a goal (a request). Whereas forward chaining acts from facts to goal, backward chaining is top-down: from conclusion (G goal ) to hypothesis (the facts from KB). Here we use the piece unification [11]. The basic outline of this procedure is: find a rule on which the goal can unify by pieces, remove the piece from the goal, add the specialized rule hypothesis to the goal, which produces a new subgoal, repeat until the subgoal is empty. 3 Conceptual Graphs for RBAC representation and inference In section 2, we described the role-based access control model and we outlined two inference procedures. In this section we present how a knowledge base can model a RBAC policy. A knowledge base is composed of a support S, a set of simple CGs (facts), and a set of rules. 3.1 Modelling basic concepts of RBAC The core elements of RBAC models are described in figure 1. For sake of readability, we do not include sessions (which lead to more complex authorization rules) in examples. Indeed, according to [2], it is possible to model sessions by adding a special relation. The support must include the following concepts and relations: Role concept type, Resource concept type,

5 5 Operation concept type, User concept type, ura of arity 2 (User,Role) relation type, pra of arity 3 (Role,Operation,Resource) relation type. Once the RBAC model is translated into a conceptual graph support, we need to add the different roles, users, operations and resources involved in the policy: for each resource within the policy, add a conformity relation resource id : Resource, for each role within the policy, add a conformity relation role id : Role, for each operation within the policy, add a conformity relation operation id : Operation, for each user within the policy, add a conformity relation user id : User. Fig. 2. user-role and role-permission assignments sample graph Once the basic concepts and relations are created, the next step towards a complete modelling of a RBAC policy (figure 1) is to translate user-role and permission-role assignment. The authorization decision in RBAC is based on user role assingments: a user is granted access to a resource if he/she is assigned to a role which is assigned to this permission (possibly through inheritance). The user-role and permission-role assignments are translated into the knowledge base by a set of simples CGs, called facts. The facts describe which roles are granted to users, and which operations are granted to roles. The figure 2 is an example of these assignments. In this graph, the user Bob is made member

6 6 of roles student and phdstudent (multiple user-role assignment), the user Charly is made member of the role lecturer, and the user Alice is made member of the role postphd. The role teacher is granted write access on resource test and the role student is granted execute access on resource test. Thus, we need to add some facts into the knowledge base: for each permission-role assignment in the policy, add a relation pra between the role, the operation and the resource into the knowledge base, for each user-role assignment in the policy, add a relation ura between the user and his/her roles into the knowledge base. 3.2 Modelling role hierarchy Fig. 3. A sample role hierarchy (no specific formalism) Figure 3 is a sample role hierarchy. For example, a user assigned to a role Sr. Lecturer will be granted every permissions granted to role Lecturer, Teacher and Researcher. Graph rules are used to represent the inheritance relation properties. Direct inheritance (e.g. Lecturer directly inherits permissions from both Teacher and Researcher roles) is modelled by an annex relation seniordirect. The complete inheritance relations are modelled with the senior relation. To model the RBAC inheritance in conceptual graphs, we need to: add the relation type seniordirect of arity 2 (Role,Role) to the support, add the relation type senior of arity 2 (Role,Role) to the support, add an order relation seniordirect < senior, add a graph rule (figure 4) settling that the inheritance relation is reflexive, add a graph rule (figure 5) settling that the inheritance relation is transitive,

7 7 add direct inheritance relations between roles to the knowldedge base (e.g. to model edges in the figure 3). Inheritance is used for authorization decision: a user is granted access to a resource, if he/she is made member of a role which inherits this access (a role also inherits itself). Fig. 4. A role inherits itself Fig. 5. Role inheritance is transitive 3.3 Modelling authorization decision mechanism and specific constraints The last step for modelling RBAC policies is to create a rule in the knowledge base for authorization decision. A user is granted access to a resource if he/she is assigned to a role which is assigned to this permission. Thus, a relation permitted of arity 3 (User, Operation, Resource) is added to the support, modelling which users are granted access. The graph rule given in figure 6 expresses how users are granted access on resources. This rule can be refered to as the core rule of the RBAC model. In the RBAC model, constraints are introduced to reflect peculiarities of organizations. Examples of such constraints are exclusions (e.g. no user can be

8 8 assigned both mutually exclusive roles) and prerequisites (e.g. if a user is assigned to a role in the policy, another user must be assigned prerequisited role, or each user must be assigned to at least one role). Both these constraints type can be modelled by graph rules. Other organization specific constraints can be expressed with CGs. For example, we can add a rule stating that the root role inherits all other ones. Fig. 6. The authorization decision rule 3.4 Reasoning on policies This subsection describes how graph rules inferences can be used to reason on RBAC policies. Our knowledge base includes: a set of concepts, the core elements of RBAC, a set of relation, used to model hierarchy, assignments and authorization, the core relations of RBAC, a set of rules, modelling properties of role inheritance, authorization core rule, constraints, a set of facts, modelling the users, roles, operations, resources and inheritance relations present in the policy. Given a query, graph rules inferences allow security officers (SOs): to know granted permissions,

9 9 to query the policy on more complex statements (e.g. figure 8), to find inconsistencies, to graphically follow the authorization mechanism, to test if adding new facts, new rules or modifying actual permission is coherent. Fig. 7. No user can be permitted both execute and write access on tests Let us consider a SO working on the university toy RBAC policy. Role hierarchy is described in figure 3, facts are pictured in figure 2, rules governing role inheritance and authorization mechanism are included in this knowledge base. The SO is defining constraints on the RBAC policy, to fit as best as possible the policy to his organization. In order to avoid any student from enter his/her own mark on a test, the SO adds the exclusion rule no user can be both granted execute and write access on tests (figure 7). He then runs an inference procedure on his policy to know if this new constraints produces an inconsistency... And it does! Following the steps of the inference, he is able (whitout specific requirements on resolution principle) to understand why this constraint can not be added to the policy. We illustrate here the backward chaining inference procedure, which starts with a graph goal modeling the inconsistency. The procedure is outlined as follows (the complete illustration can be found in annex) : there is an inconsistency if a user is both granted execute and write access on tests (step 1 to step 2), a user is granted access through his/her roles (step 2 to step 4), role student is execute granted access on test (step 4 to step 5) role teacher is write granted access on test (step 4 to step 5), a role inherits permissions of its siblings, role PostPhD inherits both roles student and teacher (step 5 to step 9), Alice is granted role PostPhD (step 9 to step 11),

10 10 thus the policy is not consistent according to the new rule. This example points out how an adequate graphical tool for RBAC policy can be useful for modelling purposes. Without such an inference tool, an SO can happen to add some contraints which can be violated but not detected, until he receives a complain from PostPhD users who may not login in the system anymore. Fig. 8. A sample query 4 Discussion In this paper, we have shown how to use the conceptual graphs framework to design and infer on role-based access control (RBAC) policies. Such inferences can be used to check policies consistency and to answer queries in order to formally test or debug policies. CGs have an appropriate graphical interface useful for specifying policies and especially for explaining inferences to security engineers. 4.1 Graphical representation of Role-Based Access Control Policies In [8], the authors point out that in order to avoid inconsistencies, it is appropriate to have a precise modelling of access control rules (their work is based on RBAC-like examples), and a visual modelling to make administration tasks easier. Their paper compare readability and checking ability of three approaches. The first approach is based on UML. The second model studied is Alloy: a structural modelling language based on first-order logic, for expressing complex structural constraints and behaviour. Finally, the third model is Graph Transformations. It is a graph model where transformation rules, which are rewriting rules, are used to deduce all possible knowledge. When a new constraint (e.g., mutually exclusive roles) is added to a given policy, these models can verify if the resulting policy is inconsistant, and give a counterexample. Nevertheless, the paper mainly focused on constraints: those

11 11 tools do not answer questions such as which roles are allowed to execute this operation on this object, or other more complex queries. Indeed, UML is only a semi-formal model, Allow Constraint Analyser is a consistency checker, and Graph Transformations do not have FOL logical semantics. In [14], the authorization schema is described using Dynamically Types Access Control (DTAC) graphical formalism. The authors aim at graphically represent RBAC schemas. However they do not propose an inference method in order to ask queries or to check for inconsistencies. 4.2 Reasoning on Role-Based Access Control Policies In [2], constraint logic programming (CLP: first order predicate calculus + linear constraints over integers / rationals / reals, e.g., Prolog + CLP library) is used to express and infer on RBAC policy. The authors describe access control programs able to deal with roles hierarchy and objects hierarchy. The authors of [6] describe a fragment of FOL which is tractable and sufficiently expressive to capture policies for many applications. This work is really interesting and points out tractability and complexity results on their logic. Unfortunately, the authors did not investigate deeply some emerging problems when dealing with complex access control models involving abstract container between users and permissions (e.g.: groups, roles, tasks, etc.) and their hierarchies. We do agree with the authors statement about the use of logic programming by non-logicians, but we do not agree that a filling the blank on English sentences interface is sufficient for security administrators. We think that administrators must have a computer-aided software engineering (CASE) interface to design and check policies built on a consistent graphical model. Moreover such CASE should provide a comprehensible reasoning trace, which can be provided through graph operations (e.g. projection of a query onto the set of facts) 4.3 Modelling sessions and Administrative RBAC models For sake of clarity the example exposed in this paper does not include sessions. We are investigating the interest of chase procedure to check RBAC policies involving sessions. For example, using chase procedure we might answer queries like Are the policies consistent for all possible sessions?. Moreover, incorporating the model for administration of roles exposed in [13] is promising for distributed policies verification purpose. 4.4 Modelling role hierarchy using concept lattice One could notice that the conceptual graphs concept lattice might be useful to model the RBAC role hierarchy. While it is indeed well suited for role hierarchy modeling, some problems arise when it comes to describing relations between roles, resources and users. For example, a graph rule is not well-suited for modeling the fact that if a user is assigned two differents roles, then an inconsistency

12 12 holds. Indeed, it may require a coreference link between two generic markers within the same hypothesis, which adds additional graphical elements. We think is it not desirable, however it is still possible. 4.5 Modelling extended RBAC models The RBAC family includes some extensions, for example TRBAC [3], GTR- BAC [7], Context-Sensitive RBAC [9], etc. Such extensions cannot be taken in considerations in the present CGs model. Indeed, it may require the expression of built-in (i.e. whose semantics is hard-coded) concepts and relations such as linear constraints, set constraints, etc. Therefore we plan to study the extension of the CGs graphical formalism and inferences to arbitrary built-in elements. References 1. Ahn, G.-J., Sandhu, R. S.: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3 (2000) Barker, S., Stuckey, P. J.: Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur. 6 (2003) Bertino, E., Bonatti, P. A., Ferrari, E.: TRBAC: A temporal Role-Based Access Control model. ACM Trans. Inf. Syst. Secur. 4 (2001) Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur. 6 (2003) Bonatti, P. A., Samarati, P.: Logics for authorization and security. Logics for Emerging Applications of Databases. (2003) Halpern, J. Y., Weissman, V.: Using first-order logic to reason about policies. CSFW. (2003) Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control model. IEEE Transactions on Knowledge and Data Engineering. 17 (2005) Koch, M., Parisi-Presicce, F.: Visual specifications of policies and their verification. FASE. Lecture Notes in Computer Science 2621 (2003) Kumar, A., Karnik, N. M., Chafle, G.: Context sensitivity in Role-Based Access Control. Operating Systems Review. 36 (2002) Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. ACM Workshop on Role-Based Access Control. (2000) Salvat, E., Mugnier, M.-L.: Sound and complete forward and backward chaining of graph rules. ICCS. Lecture Notes in Computer Science 1115 (1996) Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E.: Role-Based Access Control models. IEEE Computer. 29 (1996) Sandhu, R. S., Munawer, Q.: The ARBAC99 model for administration of roles. ACSAC. (1999) Tidswell, J., Potter, J.: A graphical definition of authorization schema in the DTAC model. ACM Symposium on Access Control Models and Technologies. (2001)

13 13 Annex: a graphical backward reasoning We here show the backward inference steps of section 3.4. The dotted lines show the pieces which are removed in every step by application of backward chaining.

14 14

Analysis of TRBAC with Dynamic Temporal Role Hierarchies

Analysis of TRBAC with Dynamic Temporal Role Hierarchies Analysis of TRBAC with Dynamic Temporal Role Hierarchies Emre Uzun 1, Vijayalakshmi Atluri 2, Jaideep Vaidya 1, and Shamik Sural 3 1 MSIS Department, Rutgers Business School, USA {emreu,jsvaidya}@cimic.rutgers.edu

More information

Integrity Constraints For Access Control Models

Integrity Constraints For Access Control Models 1 / 19 Integrity Constraints For Access Control Models Romuald THION, Stéphane COULONDRE November 27 2008 2 / 19 Outline 1 Introduction 2 3 4 5 3 / 19 Problem statement From Role-BAC to time (Generalized-Temporal-RBAC,

More information

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model James B. D. Joshi #, Elisa Bertino *, Arif Ghafoor # Center for Education and Research in Information Assurance and Security

More information

Towards Modal Logic Formalization of Role-Based Access Control with Object Classes

Towards Modal Logic Formalization of Role-Based Access Control with Object Classes Towards Modal Logic Formalization of Role-Based Access Control with Object Classes Junghwa Chae École Polytechnique de Montréal Montréal, Québec, Canada chae@cse.concordia.ca Abstract. This paper addresses

More information

RBAC: Motivations. Users: Permissions:

RBAC: Motivations. Users: Permissions: Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

A Framework for Enforcing Constrained RBAC Policies

A Framework for Enforcing Constrained RBAC Policies A Framework for Enforcing Constrained RBAC Policies Jason Crampton Information Security Group Royal Holloway, University of London jason.crampton@rhul.ac.uk Hemanth Khambhammettu Information Security Group

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 23: Role Based Access Control CS526 Topic 23: RBAC 1 Readings for This Lecture RBAC96 Family R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-Based Access

More information

Data Security and Privacy. Topic 8: Role Based Access Control

Data Security and Privacy. Topic 8: Role Based Access Control Data Security and Privacy Topic 8: Role Based Access Control Plan for this lecture CodeShield: towards personalized application whitelisting. Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:

More information

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept Aneta Poniszewska-Maranda Institute of Information Technology, Technical University of Lodz, Poland

More information

Enabling Verification and Conformance Testing for Access Control Model

Enabling Verification and Conformance Testing for Access Control Model Enabling Verification and Conformance Testing for Access Control Model Hongxin Hu and Gail Joon Ahn The University of North Carolina at Charlotte {hxhu,gahn}@uncc.edu ABSTRACT Verification and testing

More information

CS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control

CS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control CS590U Access Control: Theory and Practice Lecture 12 (February 23) Role Based Access Control Role-Based Access Control Models. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. IEEE Computer,

More information

Towards a Logical Reconstruction of Relational Database Theory

Towards a Logical Reconstruction of Relational Database Theory Towards a Logical Reconstruction of Relational Database Theory On Conceptual Modelling, Lecture Notes in Computer Science. 1984 Raymond Reiter Summary by C. Rey November 27, 2008-1 / 63 Foreword DB: 2

More information

Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management

Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management Serban I. Gavrila VDG Inc. 6009 Brookside Drive Chevy Chase, MD 20815 gavrila@csmes.ncsl.nist.gov John

More information

Temporal Hierarchy and Inheritance Semantics for GTRBAC

Temporal Hierarchy and Inheritance Semantics for GTRBAC CERIAS Tech Report 2001-52 Temporal Hierarchy and Inheritance Semantics for GTRBAC James B. D. Joshi 1, Elisa Bertino 2, Arif Ghafoor 1 Center for Education and Research in Information Assurance and Security

More information

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96 Advanced Access Control In many cases, identity is a bad criteria for authorization. We examine two modern paradigms for access control, which overcome this limitation: 1. Role-Based Access Control 2.

More information

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences xorbac Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria

More information

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information

More information

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information

More information

Role-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India

Role-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India International Journal of Emerging Research in Management &Technology Research Article July 2017 -Evolution in -based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University,

More information

RBAC POLICY IMPLEMENTATION FOR SQL DATABASES

RBAC POLICY IMPLEMENTATION FOR SQL DATABASES RBAC POLICY IMPLEMENTATION FOR SQL DATABASES Steve Barker King s College, U.K. Paul Douglas Westminster University, U.K. Abstract We show how specifications of role-based access control (RBAC) and temporal

More information

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 49-61 (2006) An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model CUNGANG

More information

Efficient Policy Analysis for Evolving Administrative Role Based Access Control 1

Efficient Policy Analysis for Evolving Administrative Role Based Access Control 1 Efficient Policy Analysis for Evolving Administrative Role Based Access Control 1 Mikhail I. Gofman 1 and Ping Yang 2 1 Dept. of Computer Science, California State University of Fullerton, CA, 92834 2

More information

Extended RBAC With Blob Storage On Cloud

Extended RBAC With Blob Storage On Cloud Extended RBAC With Blob Storage On Cloud Mamoon Rashid Research Scholar Department Of Computer Science Engineering Ramgharia Institute of Engineering and Technology Phagwara, Punjab, India. Email: mamoon873@gmail.com.

More information

Operational Semantics

Operational Semantics 15-819K: Logic Programming Lecture 4 Operational Semantics Frank Pfenning September 7, 2006 In this lecture we begin in the quest to formally capture the operational semantics in order to prove properties

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

Secure Role-Based Workflow Models

Secure Role-Based Workflow Models Secure Role-Based Workflow Models Savith Kandala and Ravi Sandhu Savith Kandala Ravi Sandhu CygnaCom Solutions. SingleSignOn.Net and George Mason University (An Entrust Technologies Company) Dept. of Information

More information

Web Services Annotation and Reasoning

Web Services Annotation and Reasoning Web Services Annotation and Reasoning, W3C Workshop on Frameworks for Semantics in Web Services Web Services Annotation and Reasoning Peter Graubmann, Evelyn Pfeuffer, Mikhail Roshchin Siemens AG, Corporate

More information

Discretionary and Mandatory Controls for Role-Based Administration

Discretionary and Mandatory Controls for Role-Based Administration Discretionary and Mandatory Controls for Role-Based Administration Jason Crampton Information Security Group, Royal Holloway, University of London jason.crampton@rhul.ac.uk Abstract. Role-based access

More information

Specification and Enforcement of Access Control in Heterogeneous Distributed Applications

Specification and Enforcement of Access Control in Heterogeneous Distributed Applications Specification and Enforcement of Access Control in Heterogeneous Distributed Applications Torsten Fink, Manuel Koch, and Cristian Oancea Institut für Informatik Freie Universität Berlin, 14195 Berlin,

More information

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic

3.4 Deduction and Evaluation: Tools Conditional-Equational Logic 3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax

More information

AN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA

AN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA AN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA Morla Dinesh 1, Shaik. Jumlesha 2 1 M.Tech (S.E), Audisankara College Of Engineering &Technology 2

More information

Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments

Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments Sigrid Schefer-Wenzl, Mark Strembeck Institute for Information Systems and New Media Vienna University of

More information

UML-Based Conceptual Modeling of Pattern-Bases

UML-Based Conceptual Modeling of Pattern-Bases UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an

More information

Alloy: A Lightweight Object Modelling Notation

Alloy: A Lightweight Object Modelling Notation Alloy: A Lightweight Object Modelling Notation Daniel Jackson, ACM Transactions on Software Engineering, 2002 Presented By: Steven Stewart, 2012-January-23 1 Alloy: 2002 to present Software is built on

More information

Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model

Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model International Journal of Computer and Communication Engineering, Vol. 3, No. 3, May 2014 Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model Ha

More information

Improving Adaptive Hypermedia by Adding Semantics

Improving Adaptive Hypermedia by Adding Semantics Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk

More information

AN ACCESS CONTROL AND TRUST MANAGEMENT FRAMEWORK FOR LOOSELY-COUPLED MULTIDOMAIN ENVIRONMENTS. Yue Zhang. Submitted to the Graduate Faculty of

AN ACCESS CONTROL AND TRUST MANAGEMENT FRAMEWORK FOR LOOSELY-COUPLED MULTIDOMAIN ENVIRONMENTS. Yue Zhang. Submitted to the Graduate Faculty of AN ACCESS CONTROL AND TRUST MANAGEMENT FRAMEWORK FOR LOOSELY-COUPLED MULTIDOMAIN ENVIRONMENTS by Yue Zhang B.S. in Computer Science Department, Nanjing University of Science and Technology, 2004 Submitted

More information

Enforcing Privacy as Access Control in a Pervasive Context

Enforcing Privacy as Access Control in a Pervasive Context Author manuscript, published in "CCNC 2012 - Consumer Communications and Networking Conference, Las Vegas, NV : United States (2012)" DOI : 10.1109/CCNC.2012.6181011 Enforcing Privacy as Access Control

More information

Towards Coq Formalisation of {log} Set Constraints Resolution

Towards Coq Formalisation of {log} Set Constraints Resolution Towards Coq Formalisation of {log} Set Constraints Resolution Catherine Dubois 1, Sulyvan Weppe 2, 1. ENSIIE, lab. Samovar, CNRS, Évry, France 2. ENSIIE, Évry, France Abstract. The language {log} is a

More information

INCONSISTENT DATABASES

INCONSISTENT DATABASES INCONSISTENT DATABASES Leopoldo Bertossi Carleton University, http://www.scs.carleton.ca/ bertossi SYNONYMS None DEFINITION An inconsistent database is a database instance that does not satisfy those integrity

More information

Conjunctive queries. Many computational problems are much easier for conjunctive queries than for general first-order queries.

Conjunctive queries. Many computational problems are much easier for conjunctive queries than for general first-order queries. Conjunctive queries Relational calculus queries without negation and disjunction. Conjunctive queries have a normal form: ( y 1 ) ( y n )(p 1 (x 1,..., x m, y 1,..., y n ) p k (x 1,..., x m, y 1,..., y

More information

Administration of RBAC

Administration of RBAC Administration of RBAC ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Fall 2005 RBAC 3 : RBAC 0 + RH + Constraints Role Hierarchy (RH) User-Role Assignment (UA)

More information

BPAL: A Platform for Managing Business Process Knowledge Bases via Logic Programming

BPAL: A Platform for Managing Business Process Knowledge Bases via Logic Programming BPAL: A Platform for Managing Business Process Knowledge Bases via Logic Programming Fabrizio Smith, Dario De Sanctis, Maurizio Proietti National Research Council, IASI Antonio Ruberti - Viale Manzoni

More information

6.001 Notes: Section 6.1

6.001 Notes: Section 6.1 6.001 Notes: Section 6.1 Slide 6.1.1 When we first starting talking about Scheme expressions, you may recall we said that (almost) every Scheme expression had three components, a syntax (legal ways of

More information

Semantic Web Systems Ontologies Jacques Fleuriot School of Informatics

Semantic Web Systems Ontologies Jacques Fleuriot School of Informatics Semantic Web Systems Ontologies Jacques Fleuriot School of Informatics 15 th January 2015 In the previous lecture l What is the Semantic Web? Web of machine-readable data l Aims of the Semantic Web Automated

More information

A Top-Down Visual Approach to GUI development

A Top-Down Visual Approach to GUI development A Top-Down Visual Approach to GUI development ROSANNA CASSINO, GENNY TORTORA, MAURIZIO TUCCI, GIULIANA VITIELLO Dipartimento di Matematica e Informatica Università di Salerno Via Ponte don Melillo 84084

More information

The TOBIAS test generator and its adaptation to some ASE challenges Position paper for the ASE Irvine Workshop

The TOBIAS test generator and its adaptation to some ASE challenges Position paper for the ASE Irvine Workshop The test generator and its adaptation to some ASE challenges Position paper for the ASE Irvine Workshop Y. Ledru Laboratoire Logiciels Systèmes Réseaux/IMAG BP 72, F-38402 Saint-Martin-d Hères CEDEX, FRANCE

More information

Intelligent flexible query answering Using Fuzzy Ontologies

Intelligent flexible query answering Using Fuzzy Ontologies International Conference on Control, Engineering & Information Technology (CEIT 14) Proceedings - Copyright IPCO-2014, pp. 262-277 ISSN 2356-5608 Intelligent flexible query answering Using Fuzzy Ontologies

More information

Mastro Studio: a system for Ontology-Based Data Management

Mastro Studio: a system for Ontology-Based Data Management Mastro Studio: a system for Ontology-Based Data Management Cristina Civili, Marco Console, Domenico Lembo, Lorenzo Lepore, Riccardo Mancini, Antonella Poggi, Marco Ruzzi, Valerio Santarelli, and Domenico

More information

UML Specification and Correction of Object-Oriented Anti-patterns

UML Specification and Correction of Object-Oriented Anti-patterns UML Specification and Correction of Object-Oriented Anti-patterns Maria Teresa Llano and Rob Pooley School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, United Kingdom {mtl4,rjpooley}@hwacuk

More information

WP3 Technologies and methods for Web applications

WP3 Technologies and methods for Web applications WP3 Technologies and methods for Web applications Introduction The primary goal of work package WP3 - Technologies and methods for Web applications - is the definition, design, and implementation of the

More information

Temporal Authorizations Scheme for XML Documents

Temporal Authorizations Scheme for XML Documents University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Temporal Authorizations Scheme for XML Documents Jing Wu University

More information

A Graph-Based Formalism for Controlling Access to a Digital Library Ontology

A Graph-Based Formalism for Controlling Access to a Digital Library Ontology A Graph-Based Formalism for Controlling Access to a Digital Library Ontology Subhasis Dasgupta 1 and Aditya Bagchi 2 1 Indian Statistical Institute, 203 B T Road, Kolkata 700108, India.

More information

Semantic Processing of Sensor Event Stream by Using External Knowledge Bases

Semantic Processing of Sensor Event Stream by Using External Knowledge Bases Semantic Processing of Sensor Event Stream by Using External Knowledge Bases Short Paper Kia Teymourian and Adrian Paschke Freie Universitaet Berlin, Berlin, Germany {kia, paschke}@inf.fu-berlin.de Abstract.

More information

Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability

Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability Georg Gottlob 1,2, Reinhard Pichler 1, and Emanuel Sallinger 2 1 TU Wien and 2 University of Oxford Tuple-generating

More information

Enhancing Datalog with Epistemic Operators to Reason About Systems Knowledge in

Enhancing Datalog with Epistemic Operators to Reason About Systems Knowledge in Enhancing Datalog with Epistemic Operators to Enhancing ReasonDatalog About Knowledge with Epistemic in Distributed Operators to Reason About Systems Knowledge in Distributed (Extended abstract) Systems

More information

SmartAccess: An Intelligent Proactive Role-Based Authorization System

SmartAccess: An Intelligent Proactive Role-Based Authorization System Department of Computer Science and Engineering University of Texas at Arlington Arlington, TX 76019 SmartAccess: An Intelligent Proactive Role-Based Authorization System Raman Adaikkalavan and Sharma Chakravarthy

More information

Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality

Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Yogita R. More 1, Dr. S. V. Gumaste 2 PG Scholar, Dept.Of Computer Engineering, GES's R. H. Sapat COE,

More information

Meta Architecting: Towered a New Generation of Architecture Description Languages

Meta Architecting: Towered a New Generation of Architecture Description Languages Journal of Computer Science 1 (4): 454-460, 2005 ISSN 1549-3636 Science Publications, 2005 Meta Architecting: Towered a New Generation of Architecture Description Languages Adel Smeda, Tahar Khammaci and

More information

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES

AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,

More information

Evaluating Access Control Policies Through Model Checking

Evaluating Access Control Policies Through Model Checking Evaluating Access Control Policies Through Model Checking Nan Zhang, Mark Ryan, and Dimitar P. Guelev School of Computer Science, University of Birmingham, Birmingham UK, B15 2TT nxz,mdr @cs.bham.ac.uk

More information

Understandability and Semantic Interoperability of Diverse Rules Systems. Adrian Walker, Reengineering [1]

Understandability and Semantic Interoperability of Diverse Rules Systems. Adrian Walker, Reengineering [1] Understandability and Semantic Interoperability of Diverse Rules Systems Adrian Walker, Reengineering [1] Position Paper for the W3C Workshop on Rule Languages for Interoperability 27-28 April 2005, Washington,

More information

An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models

An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models Xiaofeng Xia To cite this version: Xiaofeng Xia. An Equivalent Access Based Approach for Building

More information

An Ontological Analysis of Metamodeling Languages

An Ontological Analysis of Metamodeling Languages An Ontological Analysis of Metamodeling Languages Erki Eessaar and Rünno Sgirka 2 Department of Informatics, Tallinn University of Technology, Estonia, eessaar@staff.ttu.ee 2 Department of Informatics,

More information

The A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control

The A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control The A-IRBAC 2000 Model: istrative Interoperable Role-Based Access Control Jalal Al-Muhtadi, Apu Kapadia, Roy Campbell, Dennis Mickunas {almuhtad akapadia rhc mickunas}@uiuc.edu Department of Computer Science

More information

Checking General Safety Criteria on UML Statecharts

Checking General Safety Criteria on UML Statecharts Checking General Safety Criteria on UML Statecharts Zsigmond Pap, István Majzik 1 and András Pataricza Dept. of Measurement and Information Systems Budapest University of Technology and Economics H-1521

More information

Comparing the Expressive Power of Access Control Models

Comparing the Expressive Power of Access Control Models Comparing the Expressive Power of Access Control Models Mahesh V. Tripunitara tripunit@cerias.purdue.edu Ninghui Li ninghui@cs.purdue.edu Center for Education and Research in Information Assurance and

More information

CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models

CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models Bernard Stepien Hemanth Khambhammettu Kamel Adi Luigi Logrippo Department of Computer Science and Engineering, University

More information

MIT Database Management Systems Lesson 01: Introduction

MIT Database Management Systems Lesson 01: Introduction MIT 22033 Database Management Systems Lesson 01: Introduction By S. Sabraz Nawaz Senior Lecturer in MIT, FMC, SEUSL Learning Outcomes At the end of the module the student will be able to: Describe the

More information

A JAVA-BASED SYSTEM FOR XML DATA PROTECTION* E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti

A JAVA-BASED SYSTEM FOR XML DATA PROTECTION* E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti CHAPTER 2 Author- A JAVA-BASED SYSTEM FOR XML DATA PROTECTION* E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti Abstract Author- is a Java-based system for access control to XML documents. Author-

More information

A model of navigation history

A model of navigation history A model of navigation history Connor G. Brewster Alan Jeffrey August, 6 arxiv:68.5v [cs.se] 8 Aug 6 Abstract: Navigation has been a core component of the web since its inception: users and scripts can

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Operational Semantics 1 / 13

Operational Semantics 1 / 13 Operational Semantics 1 / 13 Outline What is semantics? Operational Semantics What is semantics? 2 / 13 What is the meaning of a program? Recall: aspects of a language syntax: the structure of its programs

More information

Propositional Logic. Part I

Propositional Logic. Part I Part I Propositional Logic 1 Classical Logic and the Material Conditional 1.1 Introduction 1.1.1 The first purpose of this chapter is to review classical propositional logic, including semantic tableaux.

More information

Lightweight Semantic Web Motivated Reasoning in Prolog

Lightweight Semantic Web Motivated Reasoning in Prolog Lightweight Semantic Web Motivated Reasoning in Prolog Salman Elahi, s0459408@sms.ed.ac.uk Supervisor: Dr. Dave Robertson Introduction: As the Semantic Web is, currently, in its developmental phase, different

More information

ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT

ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 3 March 2013 Page No. 806-810 ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT R. N. Jugele *, Dr.

More information

Semantic Web Test

Semantic Web Test Semantic Web Test 24.01.2017 Group 1 No. A B C D 1 X X X 2 X X 3 X X 4 X X 5 X X 6 X X X X 7 X X 8 X X 9 X X X 10 X X X 11 X 12 X X X 13 X X 14 X X 15 X X 16 X X 17 X 18 X X 19 X 20 X X 1. Which statements

More information

X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL

X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL Que Nguyet Tran Thi Faculty of Computer Science & Technology HCMC University of Technology, VNUHCM Ho Chi

More information

SCHEMA BASED XML SECURITY: RBAC APPROACH

SCHEMA BASED XML SECURITY: RBAC APPROACH SCHEMA BASED XML SECURITY: RBAC APPROACH Xinwen Zhang, Jaehong Park, and Ravi Sandhu George Mason University {xzhang6, jpark2, sandhu) } @gmu.edu Abstract Security of XML instance is a basic problem, especially

More information

λ-rbac: Programming with Role-Based Access Control

λ-rbac: Programming with Role-Based Access Control λ-rbac: Programming with Role-Based Access Control Radha Jagadeesan 1,, Alan Jeffrey 2,, Corin Pitcher 1, and James Riely 1, 1 School of CTI, DePaul University 2 Bell Labs, Lucent Technologies Abstract.

More information

APPLICATION OF A METASYSTEM IN UNIVERSITY INFORMATION SYSTEM DEVELOPMENT

APPLICATION OF A METASYSTEM IN UNIVERSITY INFORMATION SYSTEM DEVELOPMENT APPLICATION OF A METASYSTEM IN UNIVERSITY INFORMATION SYSTEM DEVELOPMENT Petr Smolík, Tomáš Hruška Department of Computer Science and Engineering, Faculty of Computer Science and Engineering, Brno University

More information

Semantic reasoning for dynamic knowledge bases. Lionel Médini M2IA Knowledge Dynamics 2018

Semantic reasoning for dynamic knowledge bases. Lionel Médini M2IA Knowledge Dynamics 2018 Semantic reasoning for dynamic knowledge bases Lionel Médini M2IA Knowledge Dynamics 2018 1 Outline Summary Logics Semantic Web Languages Reasoning Web-based reasoning techniques Reasoning using SemWeb

More information

X-KIF New Knowledge Modeling Language

X-KIF New Knowledge Modeling Language Proceedings of I-MEDIA 07 and I-SEMANTICS 07 Graz, Austria, September 5-7, 2007 X-KIF New Knowledge Modeling Language Michal Ševčenko (Czech Technical University in Prague sevcenko@vc.cvut.cz) Abstract:

More information

Data Integration: A Theoretical Perspective

Data Integration: A Theoretical Perspective Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy lenzerini@dis.uniroma1.it ABSTRACT

More information

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology

Mobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the

More information

Role-based administration of user-role assignment: The URA97 model and its Oracle implementation

Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Journal of Computer Security 7 (1999) 317 342 317 IOS Press Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Ravi Sandhu and Venkata Bhamidipati Laboratory

More information

Chapter 1. Introduction

Chapter 1. Introduction 1 Chapter 1 Introduction An exciting development of the 21st century is that the 20th-century vision of mechanized program verification is finally becoming practical, thanks to 30 years of advances in

More information

Specification of Behavioural Requirements within Compositional Multi-Agent System Design

Specification of Behavioural Requirements within Compositional Multi-Agent System Design Specification of Behavioural Requirements within Compositional Multi-Agent System Design Daniela E. Herlea 1, Catholijn M. Jonker 2, Jan Treur 2, Niek J.E. Wijngaards 1,2 1 University of Calgary, Software

More information

DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement

DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement Sabrina Kirrane Digital Enterprise Research Institute National University of Ireland, Galway http://www.deri.ie sabrina.kirrane@deri.org

More information

Database Instance And Relational Schema Design A Fact Oriented Approach

Database Instance And Relational Schema Design A Fact Oriented Approach Database Instance And Relational Schema Design A Fact Oriented Approach File-oriented approaches create problems for organizations because of d) how master files maintain facts used by certain application

More information

CPSC 427: Object-Oriented Programming

CPSC 427: Object-Oriented Programming CPSC 427: Object-Oriented Programming Michael J. Fischer Lecture 1 August 29, 2018 CPSC 427, Lecture 1, August 29, 2018 1/30 About This Course Topics to be Covered Kinds of Programming Why C++? C++ Programming

More information

Software Design Description

Software Design Description Drogba Inc. Software Design Description Ali Hopyar 1746056 Fatih Hafızoğlu 1746049 Halim Kaya 1746148 Volkan Gümüş 1746007 Table of Contents 1 Overview... 3 1.1 Scope... 3 1.2 Purpose... 3 1.3 Intended

More information

Access Control. Protects against accidental and malicious threats by

Access Control. Protects against accidental and malicious threats by Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection

More information

On Mutually-Exclusive Roles and Separation of Duty

On Mutually-Exclusive Roles and Separation of Duty On Mutually-Exclusive Roles and Separation of Duty Ninghui Li ninghui@cs.purdue.edu Ziad Bizri zelbizri@cs.purdue.edu Mahesh V. Tripunitara tripunit@cerias.purdue.edu Center for Education and Research

More information

Organizing Information. Organizing information is at the heart of information science and is important in many other

Organizing Information. Organizing information is at the heart of information science and is important in many other Dagobert Soergel College of Library and Information Services University of Maryland College Park, MD 20742 Organizing Information Organizing information is at the heart of information science and is important

More information

TooCoM : a Tool to Operationalize an Ontology with the Conceptual Graphs Model

TooCoM : a Tool to Operationalize an Ontology with the Conceptual Graphs Model TooCoM : a Tool to Operationalize an Ontology with the Conceptual Graphs Model Frédéric Fürst, Michel Leclère, Francky Trichet Institut de Recherche en Informatique de Nantes 2 rue de la Houssinière -

More information

Query Rewriting Using Views in the Presence of Inclusion Dependencies

Query Rewriting Using Views in the Presence of Inclusion Dependencies Query Rewriting Using Views in the Presence of Inclusion Dependencies Qingyuan Bai Jun Hong Michael F. McTear School of Computing and Mathematics, University of Ulster at Jordanstown, Newtownabbey, Co.

More information

Trustworthiness Based Authorization on WWW

Trustworthiness Based Authorization on WWW CERIAS Tech Report 2002-08 Trustworthiness Based Authorization on WWW Y. Zong, B. Bhargava, M. Mahoui Center for Education and Research in Information Assurance and Security & Department of Computer Science,

More information

Context-Sensitive Data Security for Business Applications Performance Optimization

Context-Sensitive Data Security for Business Applications Performance Optimization Context-Sensitive Data Security for Business Applications Performance Optimization Arjun K Sirohi Oracle USA Inc, Bellevue, WA, USA Arjun.Sirohi@oracle.com Abstract the importance of data security in enterprise

More information

Inconsistency-tolerant logics

Inconsistency-tolerant logics Inconsistency-tolerant logics CS 157 Computational Logic Autumn 2010 Inconsistent logical theories T 1 = { p(a), p(a) } T 2 = { x(p(x) q(x)), p(a), q(a) } Definition: A theory T is inconsistent if T has

More information