Skip to main content

Meca: A Tool for Access Control Models

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4355))

Abstract

Access Control is a technique which insures security by preserving confidentiality and integrity of information. Meca (Models for access control) is a tool which generates, in a B machine, operational conditions that should be verified by an application to insure security.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bell, D.E., Lapadula, L.J.: Secure computer systems: A mathematical model. Technical report esd-tr-278, vol. 2, The Mitre Corporation, Bedford (1973)

    Google Scholar 

  2. Biba, K.J.: Integrity considerations for secure computer systems. Technical report tr-3153, The Mitre Corporation, Bedford (1997)

    Google Scholar 

  3. Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference (1992)

    Google Scholar 

  4. Lampson, B.W.: Protection. In: 5th Princeton Symposium on Information Science and Systems, pp. 437–443 (1971)

    Google Scholar 

  5. Marlet, R., Mesnil, C.: A demonstrative electronic purse -Card specification, pp. 1–53 (2002)

    Google Scholar 

  6. Sandhu, R.S.: Role hierarchies and constraints for lattice-bases access controls. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 65–79. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Haddad, A. (2006). Meca: A Tool for Access Control Models. In: Julliand, J., Kouchnarenko, O. (eds) B 2007: Formal Specification and Development in B. B 2007. Lecture Notes in Computer Science, vol 4355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11955757_30

Download citation

  • DOI: https://doi.org/10.1007/11955757_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68760-3

  • Online ISBN: 978-3-540-68761-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics