Security pattern lattice: A formal model to organize security patterns

被引:10
|
作者
Sarmah, Achyanta [1 ]
Hazarika, Shyamanta M. [1 ]
Sinha, Smriti K. [1 ]
机构
[1] Tezpur Univ, Sch Engn, Tezpur, Assam, India
关键词
trust; security pattern; Formal Concept Analysis; concept lattice; scaling;
D O I
10.1109/DEXA.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Except for some work in classifying Security Patterns (SP) based on taxonomy and linguistic metaphors not much has been done in organizing SP. No suitable formal model for organization of security patterns is yet available. In this paper, exploiting results from Formal Concept Analysis (FCA) a formal model to organize SP is introduced. Using a trust-based security model, Trust Elements (TE) and SP are enumerated. These elements and patterns are treated as formal concepts leading to a Security Pattern Lattice SPL and organized as a concept lattice to generate the security pattern lattice. Within such a model the patterns are categorized using the FCA technique of scaling.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [1] What are Security Patterns? A Formal Model for Security and Design of Software
    Behrens, Anika
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [2] Reconstructing a formal security model
    Ahn, GJ
    Hong, SP
    Shin, ME
    INFORMATION AND SOFTWARE TECHNOLOGY, 2002, 44 (11) : 649 - 657
  • [3] Formal security model of multisignatures
    Komano, Yuichi
    Ohta, Kazuo
    Shimbo, Atsushi
    Kawamura, Shinichi
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 146 - 160
  • [4] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, G
    FM'99-FORMAL METHODS, 1999, 1708 : 718 - 737
  • [5] A Formal Multilevel Database Security Model
    Wang Baohua
    Ma Xinqiang
    Li Danning
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 815 - +
  • [6] Towards a Formal IoT Security Model
    Martin, Tania
    Geneiatakis, Dimitrios
    Kounelis, Ioannis
    Kerckhof, Stephanie
    Fovino, Igor Nai
    SYMMETRY-BASEL, 2020, 12 (08): : 1 - 16
  • [7] A formal model for the grid security infrastructure
    Li, BY
    Rao, RN
    Li, ML
    You, JY
    WEB INFORMATION SYSTEMS - WISE 2004, PROCEEDINGS, 2004, 3306 : 706 - 717
  • [8] A formal model of Healthcare Security Policy
    Cohen, B
    TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196
  • [9] A formal security model for microprocessor hardware
    Lotz, V
    Kessler, V
    Walter, GH
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2000, 26 (08) : 702 - 712
  • [10] Guiding the selection of security patterns based on security requirements and pattern classification
    Motii, Anas
    Hamid, Brahim
    Lanusse, Agnes
    Bruel, Jean-Michel
    PROCEEDINGS OF THE 20TH EUROPEAN CONFERENCE ON PATTERN LANGUAGES OF PROGRAMS (EUROPLOP 2015), 2015,