Time dependent policy-based access control

Panagiotis Vasilikos, Flemming Nielson, Hanne Riis Nielson

Research output: Contribution to journalConference articleResearchpeer-review

188 Downloads (Pure)


Access control policies are essential to determine who is allowed to access data in a system without compromising the data's security. However, applications inside a distributed environment may require those policies to be dependent on the actual content of the data, the flow of information, while also on other attributes of the environment such as the time. In this paper, we use systems of Timed Automata to model distributed systems and we present a logic in which one can express time-dependent policies for access control. We show how a fragment of our logic can be reduced to a logic that current model checkers for Timed Automata such as UPPAAL can handle and we present a translator that performs this reduction. We then use our translator and UPPAAL to enforce time-dependent policy-based access control on an example application from the aerospace industry.
Original languageEnglish
JournalLeibniz International Proceedings in Informatics
Number of pages18
Publication statusPublished - 2017
Event24th International Symposium on Temporal Representation and Reasoning - Mons, Belgium
Duration: 16 Oct 201718 Oct 2017


Conference24th International Symposium on Temporal Representation and Reasoning


  • Software
  • Access control
  • Time-dependent policies
  • Timed automata
  • Aerospace industry
  • Automata theory
  • Computer circuits
  • Model checking
  • Network security
  • Access control policies
  • Current modeling
  • Distributed environments
  • Distributed systems
  • Policy based access control
  • Time dependent
  • Timed Automata
  • Computer Theory (Includes Formal Logic, Automata Theory, Switching Theory and Programming Theory)
  • Computer Circuits
  • Computer Software, Data Handling and Applications

Fingerprint Dive into the research topics of 'Time dependent policy-based access control'. Together they form a unique fingerprint.

Cite this