Analysis and run-time verification of dynamic security policies

被引:0
|
作者
Janicke, Helge [1 ]
Siewe, Frangois [1 ]
Jones, Kevin [1 ]
Cau, Antonio [1 ]
Zedan, Hussein [1 ]
机构
[1] De Montfort Univ, Software Technol Res Lab, Leicester LE1 9BH, Leics, England
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Ensuring the confidentiality, integrity and availability of information is the key issue in the battle for information superiority and thus is a decisive factor in modern warfare, Security policies and security mechanisms govern the access to information and other resources. Their correct specification, i.e. denial of potentially dangerous access and adherence to all established need-to-know requirements, is critical. In this paper we present a security model that allows to express dynamic access control policies that can change on time or events. A simple agent system, simulating a platoon, is used to show the need and the advantages of our policy model. The paper finally presents how existing tool-support can be used for the analysis and verification of policies.
引用
收藏
页码:92 / 103
页数:12
相关论文
共 50 条
  • [1] An Ontology for run-time Verification of Security Certificates for SOA
    D'Agostini, Stefania
    Di Giacomo, Valentina
    Pandolfo, Claudia
    Presenza, Domenico
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 525 - 533
  • [2] Run-time verification
    Colin, S
    Mariani, L
    [J]. MODEL-BASED TESTING OF REACTIVE SYSTEMS, 2005, 3472 : 525 - 555
  • [3] Edit automata: Enforcement mechanisms for run-time security policies
    Ligatti J.
    Bauer L.
    Walker D.
    [J]. International Journal of Information Security, 2005, 4 (1-2) : 2 - 16
  • [4] Run-Time Verification of Coboxes
    de Boer, Frank S.
    de Gouw, Stijn
    Wong, Peter Y. H.
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 259 - 273
  • [5] On run-time enforcement of policies
    Shah, Harshit
    Shyamasundar, R. K.
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 268 - +
  • [6] Run-time verification of networked software
    Research Center for Information Security , National Institute of Advanced Industrial Science and Technology , Tokyo, Japan
    [J]. Lect. Notes Comput. Sci, (59-73):
  • [7] Run-Time Verification of Optimistic Concurrency
    Sezgin, Ali
    Tasiran, Serdar
    Muslu, Kivanc
    Qadeer, Shaz
    [J]. RUNTIME VERIFICATION, 2010, 6418 : 384 - +
  • [8] Run-Time Verification of Networked Software
    Artho, Cyrille Valentin
    [J]. RUNTIME VERIFICATION, 2010, 6418 : 59 - 73
  • [9] On the run-time verification of autonomy software
    Tiwari, A
    Sinha, P
    Ramachandran, U
    [J]. 28TH ANNUAL NASA GODDARD SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2004, : 58 - 65
  • [10] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)