TY - GEN
T1 - Formal verification for access control in web information sharing system
AU - Sakai, Akihiro
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2009
Y1 - 2009
N2 - When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.
AB - When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.
UR - http://www.scopus.com/inward/record.url?scp=70350626823&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350626823&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02617-1_9
DO - 10.1007/978-3-642-02617-1_9
M3 - Conference contribution
AN - SCOPUS:70350626823
SN - 3642026168
SN - 9783642026164
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 80
EP - 89
BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
T2 - 3rd International Conference on Information Security and Assurance, ISA 2009
Y2 - 25 June 2009 through 27 June 2009
ER -