Repository logo
 

ENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORK

dc.contributor.advisorDing, Junhuaen_US
dc.contributor.authorAnderson, James Carolden_US
dc.contributor.departmentComputer Scienceen_US
dc.date.accessioned2012-09-04T18:08:19Z
dc.date.available2012-09-04T18:08:19Z
dc.date.issued2012en_US
dc.description.abstractSocial networks supply a means by which people can communicate with each other while allowing for ease in initiating interaction and expressions. These systems of human collaboration may also be used to store and distribute information of a sensitive nature that must be secured against intrusions at all times. Given the massive operation embodied by social networks, multiple methods have been developed that control the flow of information so that those with authorization can gain access. Before allowing a social network to begin distributing its contents, a prudent prerequisite should be that the security protocols prevent unauthorized access.   Formal modeling and analysis of security properties, particularly those of Role-Based Access Control (RBAC), in social networks is the main focus of this thesis. A social network system and its security assurance mechanisms are modeled using the input language of Symbolic Model Verifier (SMV), and the properties of the system are specified using computation tree temporal logic (CTL*). Those properties are then verified using the SMV model checker. A real case was studied to demonstrate the effectiveness of model checking security properties in a social network system. The case consists of an account in which a group of users share various resources and access privileges which are controlled by RBAC. The case study results show that model checking is capable of formally analyzing security policies particularly RBAC in a social network system. In addition, the counter examples generated from model checking could help to create test cases for testing system implementation, and they can help us to find defects in the model as well. Formally modeling and model checking security policies in a complex system, like a social network, can greatly improve the security of these systems.  en_US
dc.description.degreeM.S.en_US
dc.format.extent240 p.en_US
dc.format.mediumdissertations, academicen_US
dc.identifier.urihttp://hdl.handle.net/10342/3936
dc.language.isoen_US
dc.publisherEast Carolina Universityen_US
dc.subjectComputer scienceen_US
dc.subjectModel checkingen_US
dc.subjectSocial networksen_US
dc.subject.lcshComputer security
dc.subject.lcshSocial networks--Security measures
dc.subject.lcshInformation storage and retrieval systems--Security measures
dc.titleENFORCING ROLE-BASED ACCESS CONTROL ON A SOCIAL NETWORKen_US
dc.title.alternativeEnforcing role-based access control in a social network
dc.typeMaster's Thesisen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Anderson_ecu_0600M_10701.pdf
Size:
1.15 MB
Format:
Adobe Portable Document Format