Concurrent Usage Control Implementation Verification Using the SPIN Model Checker

The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a forma...

Full description

Saved in:
Bibliographic Details
Published inRecent Trends in Network Security and Applications pp. 214 - 223
Main Authors Rajkumar, P. V., Ghosh, S. K., Dasgupta, P.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2010
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9783642144776
3642144772
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-14478-3_22

Cover

Abstract The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a formal verification tool, the SPIN model checker, for verifying the correctness of the concurrent usage control implementation. We also provide an illustrative case study.
AbstractList The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a formal verification tool, the SPIN model checker, for verifying the correctness of the concurrent usage control implementation. We also provide an illustrative case study.
Author Ghosh, S. K.
Dasgupta, P.
Rajkumar, P. V.
Author_xml – sequence: 1
  givenname: P. V.
  surname: Rajkumar
  fullname: Rajkumar, P. V.
  email: vrj@sit.iitkgp.ernet.in
  organization: School of Information Technology, Indian Institute of Technology, Kharagpur, India
– sequence: 2
  givenname: S. K.
  surname: Ghosh
  fullname: Ghosh, S. K.
  email: skg@iitkgp.ac.in
  organization: School of Information Technology, Indian Institute of Technology, Kharagpur, India
– sequence: 3
  givenname: P.
  surname: Dasgupta
  fullname: Dasgupta, P.
  email: pallab@cse.iitkgp.ac.in
  organization: Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India
BookMark eNpVkNtOAjEQhqtiIiJv4EVfYLWdni_NRpEET1G8bcrShZVlS9r1_S1gTJybmfn-ZDL5LtGgC51H6JqSG0qIujVKF6yQHArK-X62ACdonDHL8MDYKRpSLUVBDFNn_zIlB38ZmAs0TumL5BKaaCOG6K0MXfUdo-96PE9u5XEGfQwtnm53rd9m7vomdPjTx6ZuquMyT023wv3a4_fX6TN-Ckvf4nLtq42PV-i8dm3y498-QvOH-4_ysZi9TKbl3axIlDIoalXRyvClY44pviDccKgNl1QL6WsALgQDTyQsleMEalCSa7nwwDQTlTNshOB4N-1i_sZHuwhhkywldu_NZgmW2azBHhzZvTf2A36aW_w
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DOI 10.1007/978-3-642-14478-3_22
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642144783
3642144780
EISSN 1865-0937
Editor Nagamalai, Dhinaharan
Boumerdassi, Selma
Meghanathan, Natarajan
Chaki, Nabendu
Editor_xml – sequence: 1
  givenname: Natarajan
  surname: Meghanathan
  fullname: Meghanathan, Natarajan
  email: natarajan.meghanathan@jsums.edu
– sequence: 2
  givenname: Selma
  surname: Boumerdassi
  fullname: Boumerdassi, Selma
  email: selma.boumerdassi@cedric.fr
– sequence: 3
  givenname: Nabendu
  surname: Chaki
  fullname: Chaki, Nabendu
  email: nabendu@ieee.org
– sequence: 4
  givenname: Dhinaharan
  surname: Nagamalai
  fullname: Nagamalai, Dhinaharan
  email: dhinthia@yahoo.com
EndPage 223
GroupedDBID 29F
ALMA_UNASSIGNED_HOLDINGS
RSU
ID FETCH-LOGICAL-s1132-f7c1c94da3a374b04942f9461856ef2245532e062d7a402f276486be23835ca93
ISBN 9783642144776
3642144772
ISSN 1865-0929
IngestDate Tue Jul 29 20:00:44 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1132-f7c1c94da3a374b04942f9461856ef2245532e062d7a402f276486be23835ca93
PageCount 10
ParticipantIDs springer_books_10_1007_978_3_642_14478_3_22
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings
PublicationTitle Recent Trends in Network Security and Applications
PublicationYear 2010
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
SSID ssj0000580895
ssj0000426779
ssib054953581
Score 1.3966341
Snippet The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation....
SourceID springer
SourceType Publisher
StartPage 214
SubjectTerms Concurrency
Software Implementation and Model Checking
Usage control
Title Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
URI http://link.springer.com/10.1007/978-3-642-14478-3_22
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nj9MwELVKuQAHYAHxLR-4RYkS24mb46osWhaoinZb7S1KYmdXfKSItBd-DL-VGdtJXHaFtFyiyKoax_NqT8fvPRPyptGKJ0qxMC_zJhQJq8Mq1kmo8lphQqBYjmrkT4vseCVOztPzyeS3x1rabauo_nWtruR_ogptEFdUyd4gssOXQgPcQ3zhChGG61_J736Z1VnEIrEyGEmtC8vodiX0rTVWOvQ2qMc9nS9fe2b1MgrW0UDCudx0psxyGgUfhta3ZXex-2GzzGXkY2y-aWvn77RCghrqBw3x3XgOf3eypjZYw2A0rheBJSlgvnu6fL8wh7F9C-aXGvkddo5D7-VuX7rSWXWiPYHCcZgH3WU_QfkVDEOE8ysYfQUz-IfBlxGbCLR3k_a4GDddz7I0jHNXM9F-m7WSGaZl4a3wzCqcrywePl8EHhbi0-C-YLDE34IOTMntw6OTj-t-vkqRm9vbx5mVH9Id6XY9rbf8LJ6Zg3-GjqK8qH8RZg2gxhfzpJ3X9eLKZr3Jgc4ekHuoi6EoWIEYPCQT3R6Q-31MqIvBAbnrWVw-Ip9HjFCDEeowQvcxQn2MUIMRChihiBFqMEIdRh6T1bujs_lx6I7xCLsk4SxsZJ3UuVAlL7kUFRoSsSYXGWSKmW4ghUxTznScMSVLEbOGyUzMskpDMsnTusz5EzJtN61-SiiPSwYrDgwdkyKus5wlSnL8Dy6l0k31jAT9CBX4w-yK3pUbxrPgBYxnYcazwPF8fqNPvyB3RvC-JNPtz51-BQnptnrtcPEHN1x-5w
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Recent+Trends+in+Network+Security+and+Applications&rft.au=Rajkumar%2C+P.+V.&rft.au=Ghosh%2C+S.+K.&rft.au=Dasgupta%2C+P.&rft.atitle=Concurrent+Usage+Control+Implementation+Verification+Using+the+SPIN+Model+Checker&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642144776&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=214&rft.epage=223&rft_id=info:doi/10.1007%2F978-3-642-14478-3_22
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon