Treffer: λ-RBAC : Programming with Role-Based Access Control
Title:
λ-RBAC : Programming with Role-Based Access Control
Authors:
Source:
Automata, languages and programming (Part I-II : 33rd international colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006 : proceedings)0ICALP 2006. :456-467
Publisher Information:
Berlin; New York: Springer, 2006.
Publication Year:
2006
Physical Description:
print, 27 ref
Original Material:
INIST-CNRS
Subject Terms:
Control theory, operational research, Automatique, recherche opérationnelle, Computer science, Informatique, Telecommunications, Télécommunications, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Informatique théorique, Theoretical computing, Automates. Machines abstraites. Machines de turing, Automata. Abstract machines. Turing machines, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Analyse statique, Static analysis, Análisis estática, Contrôle accès, Access control, In situ, Méthode formelle, Formal method, Método formal, Sécurité informatique, Computer security, Seguridad informatica, Vérification programme, Program verification, Verificación programa
Document Type:
Konferenz
Conference Paper
File Description:
text
Language:
English
Author Affiliations:
School of CTI, DePaul University
Bell Labs, Lucent Technologies
Bell Labs, Lucent Technologies
ISSN:
0302-9743
Rights:
Copyright 2008 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.19993506
Database:
PASCAL Archive
Weitere Informationen
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanisms,which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise: - The user of a component faces the issue of safety: is a particular role sufficient to use the component? - The component designer faces the dual issue of protection: is a particular role demanded in all execution paths of the component? We provide a formal calculus and static analysis to answer both questions.