FORMAL SPECIFICATION OF SECURITY REQUIREMENTS USING THE THEORY OF NORMATIVE POSITIONS

被引:0
|
作者
JONES, AJI [1 ]
SERGOT, M [1 ]
机构
[1] UNIV LONDON IMPERIAL COLL SCI TECHNOL & MED, DEPT COMP, LONDON SW7 2BZ, ENGLAND
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We use a number of the examples presented in [Ting 1990] to illustrate how the formal theory of normative positions may serve as a tool for clarifying, and making precise, the specification of security requirements, particularly in regard to access control. We describe the basic features of the theory of nonnative positions (which has its roots in the analytical theory of law), and of the modal logics (deontic and action logics) involved in its formulation. We then indicate three levels of software we have under development, which aim to turn the analytical procedures into a practical tool. Our concluding remarks relate our discussion of Ting's examples to some particular issues in the formal specification of computer systems.
引用
收藏
页码:103 / 121
页数:19
相关论文
共 50 条
  • [1] Security Requirements Specification: A Formal Method Perspective
    Mishra, Aditya Dev
    Mustafa, K.
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM-2020), 2019, : 113 - 117
  • [2] A review on security requirements specification by formal methods
    Mishra, Aditya Dev
    Mustafa, Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [3] A Formal Methods Approach to Security Requirements Specification and Verification
    Rouland, Quentin
    Hamid, Brahim
    Bodeveix, Jean-Paul
    Filali, Mamoun
    2019 24TH INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2019), 2019, : 236 - 241
  • [4] Security requirements specification by formal methods: a research metadata analysis
    Aditya Dev Mishra
    Khurram Mustafa
    Multimedia Tools and Applications, 2024, 83 : 41847 - 41866
  • [5] Security requirements specification by formal methods: a research metadata analysis
    Mishra, Aditya Dev
    Mustafa, Khurram
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (14) : 41847 - 41866
  • [6] From Natural Language Requirements to Formal Specification using an Ontology
    Sadoun, Driss
    Dubois, Catherine
    Ghamri-Doudane, Yacine
    Grau, Brigitte
    2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 755 - 760
  • [7] Normative specification: A tool for trust and security
    Pacheco, O
    FORMAL ASPECTS IN SECURITY AND TRUST, 2006, 3866 : 187 - 202
  • [8] A generic approach to the formal specification of requirements
    Peper, C
    Gotzhein, R
    Kronenburg, M
    FIRST IEEE INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 1997, : 252 - 261
  • [9] On the use of visualization in formal requirements specification
    Dulac, N
    Viguier, T
    Leveson, N
    Storey, MA
    IEEE JOINT INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2002, : 71 - 80
  • [10] A method for requirements elicitation and formal specification
    Heisel, M
    Souquières, J
    CONCEPTUAL MODELING - ER'99, 1999, 1728 : 309 - 324