Concurrent Usage Control Implementation Verification Using the SPIN Model Checker
The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a forma...
        Saved in:
      
    
          | Published in | Recent Trends in Network Security and Applications pp. 214 - 223 | 
|---|---|
| Main Authors | , , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Berlin, Heidelberg
          Springer Berlin Heidelberg
    
        2010
     | 
| Series | Communications in Computer and Information Science | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9783642144776 3642144772  | 
| ISSN | 1865-0929 1865-0937  | 
| DOI | 10.1007/978-3-642-14478-3_22 | 
Cover
| Abstract | The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a formal verification tool, the SPIN model checker, for verifying the correctness of the concurrent usage control implementation. We also provide an illustrative case study. | 
    
|---|---|
| AbstractList | The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation. Manual verification of application specific concurrent usage control implementation is a hard problem. In this paper, we show the usage of a formal verification tool, the SPIN model checker, for verifying the correctness of the concurrent usage control implementation. We also provide an illustrative case study. | 
    
| Author | Ghosh, S. K. Dasgupta, P. Rajkumar, P. V.  | 
    
| Author_xml | – sequence: 1 givenname: P. V. surname: Rajkumar fullname: Rajkumar, P. V. email: vrj@sit.iitkgp.ernet.in organization: School of Information Technology, Indian Institute of Technology, Kharagpur, India – sequence: 2 givenname: S. K. surname: Ghosh fullname: Ghosh, S. K. email: skg@iitkgp.ac.in organization: School of Information Technology, Indian Institute of Technology, Kharagpur, India – sequence: 3 givenname: P. surname: Dasgupta fullname: Dasgupta, P. email: pallab@cse.iitkgp.ac.in organization: Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India  | 
    
| BookMark | eNpVkNtOAjEQhqtiIiJv4EVfYLWdni_NRpEET1G8bcrShZVlS9r1_S1gTJybmfn-ZDL5LtGgC51H6JqSG0qIujVKF6yQHArK-X62ACdonDHL8MDYKRpSLUVBDFNn_zIlB38ZmAs0TumL5BKaaCOG6K0MXfUdo-96PE9u5XEGfQwtnm53rd9m7vomdPjTx6ZuquMyT023wv3a4_fX6TN-Ckvf4nLtq42PV-i8dm3y498-QvOH-4_ysZi9TKbl3axIlDIoalXRyvClY44pviDccKgNl1QL6WsALgQDTyQsleMEalCSa7nwwDQTlTNshOB4N-1i_sZHuwhhkywldu_NZgmW2azBHhzZvTf2A36aW_w | 
    
| ContentType | Book Chapter | 
    
| Copyright | Springer-Verlag Berlin Heidelberg 2010 | 
    
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 | 
    
| DOI | 10.1007/978-3-642-14478-3_22 | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISBN | 9783642144783 3642144780  | 
    
| EISSN | 1865-0937 | 
    
| Editor | Nagamalai, Dhinaharan Boumerdassi, Selma Meghanathan, Natarajan Chaki, Nabendu  | 
    
| Editor_xml | – sequence: 1 givenname: Natarajan surname: Meghanathan fullname: Meghanathan, Natarajan email: natarajan.meghanathan@jsums.edu – sequence: 2 givenname: Selma surname: Boumerdassi fullname: Boumerdassi, Selma email: selma.boumerdassi@cedric.fr – sequence: 3 givenname: Nabendu surname: Chaki fullname: Chaki, Nabendu email: nabendu@ieee.org – sequence: 4 givenname: Dhinaharan surname: Nagamalai fullname: Nagamalai, Dhinaharan email: dhinthia@yahoo.com  | 
    
| EndPage | 223 | 
    
| GroupedDBID | 29F ALMA_UNASSIGNED_HOLDINGS RSU  | 
    
| ID | FETCH-LOGICAL-s1132-f7c1c94da3a374b04942f9461856ef2245532e062d7a402f276486be23835ca93 | 
    
| ISBN | 9783642144776 3642144772  | 
    
| ISSN | 1865-0929 | 
    
| IngestDate | Tue Jul 29 20:00:44 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-s1132-f7c1c94da3a374b04942f9461856ef2245532e062d7a402f276486be23835ca93 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | springer_books_10_1007_978_3_642_14478_3_22 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2010 | 
    
| PublicationDateYYYYMMDD | 2010-01-01 | 
    
| PublicationDate_xml | – year: 2010 text: 2010  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Berlin, Heidelberg | 
    
| PublicationPlace_xml | – name: Berlin, Heidelberg | 
    
| PublicationSeriesTitle | Communications in Computer and Information Science | 
    
| PublicationSubtitle | Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings | 
    
| PublicationTitle | Recent Trends in Network Security and Applications | 
    
| PublicationYear | 2010 | 
    
| Publisher | Springer Berlin Heidelberg | 
    
| Publisher_xml | – name: Springer Berlin Heidelberg | 
    
| SSID | ssj0000580895 ssj0000426779 ssib054953581  | 
    
| Score | 1.3966341 | 
    
| Snippet | The UCONA usage control authorization model supports concurrency and the model left issue of synchronizing usage control processes to the implementation.... | 
    
| SourceID | springer | 
    
| SourceType | Publisher | 
    
| StartPage | 214 | 
    
| SubjectTerms | Concurrency Software Implementation and Model Checking Usage control  | 
    
| Title | Concurrent Usage Control Implementation Verification Using the SPIN Model Checker | 
    
| URI | http://link.springer.com/10.1007/978-3-642-14478-3_22 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Nj9MwELVKuQAHYAHxLR-4RYkS24mb46osWhaoinZb7S1KYmdXfKSItBd-DL-VGdtJXHaFtFyiyKoax_NqT8fvPRPyptGKJ0qxMC_zJhQJq8Mq1kmo8lphQqBYjmrkT4vseCVOztPzyeS3x1rabauo_nWtruR_ogptEFdUyd4gssOXQgPcQ3zhChGG61_J736Z1VnEIrEyGEmtC8vodiX0rTVWOvQ2qMc9nS9fe2b1MgrW0UDCudx0psxyGgUfhta3ZXex-2GzzGXkY2y-aWvn77RCghrqBw3x3XgOf3eypjZYw2A0rheBJSlgvnu6fL8wh7F9C-aXGvkddo5D7-VuX7rSWXWiPYHCcZgH3WU_QfkVDEOE8ysYfQUz-IfBlxGbCLR3k_a4GDddz7I0jHNXM9F-m7WSGaZl4a3wzCqcrywePl8EHhbi0-C-YLDE34IOTMntw6OTj-t-vkqRm9vbx5mVH9Id6XY9rbf8LJ6Zg3-GjqK8qH8RZg2gxhfzpJ3X9eLKZr3Jgc4ekHuoi6EoWIEYPCQT3R6Q-31MqIvBAbnrWVw-Ip9HjFCDEeowQvcxQn2MUIMRChihiBFqMEIdRh6T1bujs_lx6I7xCLsk4SxsZJ3UuVAlL7kUFRoSsSYXGWSKmW4ghUxTznScMSVLEbOGyUzMskpDMsnTusz5EzJtN61-SiiPSwYrDgwdkyKus5wlSnL8Dy6l0k31jAT9CBX4w-yK3pUbxrPgBYxnYcazwPF8fqNPvyB3RvC-JNPtz51-BQnptnrtcPEHN1x-5w | 
    
| linkProvider | Library Specific Holdings | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Recent+Trends+in+Network+Security+and+Applications&rft.au=Rajkumar%2C+P.+V.&rft.au=Ghosh%2C+S.+K.&rft.au=Dasgupta%2C+P.&rft.atitle=Concurrent+Usage+Control+Implementation+Verification+Using+the+SPIN+Model+Checker&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642144776&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=214&rft.epage=223&rft_id=info:doi/10.1007%2F978-3-642-14478-3_22 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon |