• DocumentCode
    2119409
  • Title

    Verification and Analysis of Access Control Policy with Colored Petri Net

  • Author

    Feng, Fujun ; Li, Junshan

  • Author_Institution
    Dept. of Comput., Second Artillery Eng. Coll., Xi´´an
  • fYear
    2009
  • fDate
    27-28 Feb. 2009
  • Firstpage
    610
  • Lastpage
    614
  • Abstract
    A Trust and Context based Access Control model (TCAC) is proposed in this paper, which integrates trust value and context information of users into traditional role based access control. TCAC is flexible and dynamic to limit the authorizations to users. Verification and analysis of access control policy can help us understand the security requirements and states of systems. Colored Petri Net (CPN) extends the traditional Petri net, it can simply the net structure, and analyze the security and correctness of complicated systems before really constructing them. We present a CPN model of role activation/ deactivation of TCAC policy, and discuss the color sets, places, arc expressions and guard functions in CPN model. The consistency of TCAC policy is verified based on CPN model and reachability analysis.
  • Keywords
    Petri nets; authorisation; graph colouring; colored Petri net; complicated system; context based access control model; role based access control; security requirement; Access control; Authorization; Computer networks; Computer security; Context modeling; Control system analysis; Information analysis; Information security; Permission; Reachability analysis; access control; colored petri net; verification;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Software and Networks, 2009. ICCSN '09. International Conference on
  • Conference_Location
    Macau
  • Print_ISBN
    978-0-7695-3522-7
  • Type

    conf

  • DOI
    10.1109/ICCSN.2009.58
  • Filename
    5076926