Security pattern lattice: A formal model to organize security patterns

被引:10
|
作者
Sarmah, Achyanta [1 ]
Hazarika, Shyamanta M. [1 ]
Sinha, Smriti K. [1 ]
机构
[1] Tezpur Univ, Sch Engn, Tezpur, Assam, India
关键词
trust; security pattern; Formal Concept Analysis; concept lattice; scaling;
D O I
10.1109/DEXA.2008.74
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Except for some work in classifying Security Patterns (SP) based on taxonomy and linguistic metaphors not much has been done in organizing SP. No suitable formal model for organization of security patterns is yet available. In this paper, exploiting results from Formal Concept Analysis (FCA) a formal model to organize SP is introduced. Using a trust-based security model, Trust Elements (TE) and SP are enumerated. These elements and patterns are treated as formal concepts leading to a Security Pattern Lattice SPL and organized as a concept lattice to generate the security pattern lattice. Within such a model the patterns are categorized using the FCA technique of scaling.
引用
收藏
页码:292 / 296
页数:5
相关论文
共 50 条
  • [41] Formal methods for web security
    Bugliesi, Michele
    Calzavara, Stefano
    Focardi, Riccardo
    JOURNAL OF LOGICAL AND ALGEBRAIC METHODS IN PROGRAMMING, 2017, 87 : 110 - 126
  • [42] A Formal Implementation of Database Security
    Bai, Yun
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 13, 2006, 13 : 90 - 92
  • [43] On the role of formal methods in security
    Rao, JR
    INFORMATION PROCESSING LETTERS, 2001, 77 (2-4) : 209 - 212
  • [44] Formal methods and security evaluation
    Bolignano, D
    THEOREM PROVING IN HIGHER ORDER LOGICS, PROCEEDINGS, 1999, 1690 : 291 - 291
  • [45] Formal methods for smartcard security
    Barthe, G
    Dufay, G
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 133 - 177
  • [46] A FORMAL APPROACH TO SECURITY ARCHITECTURES
    RUEPPEL, RA
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 385 - 398
  • [47] Formal Proofs for the Security of Signcryption
    Joonsang Baek
    Ron Steinfeld
    Yuliang Zheng
    Journal of Cryptology, 2007, 20 : 203 - 235
  • [48] Formal proofs for the security of signcryption
    Baek, Joonsang
    Steinfeld, Ron
    Zheng, Yuliang
    JOURNAL OF CRYPTOLOGY, 2007, 20 (02) : 203 - 235
  • [49] A formal framework for provenance security
    Cheney, James
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 281 - 293
  • [50] FORMAL MODELS FOR COMPUTER SECURITY
    LANDWEHR, CE
    COMPUTING SURVEYS, 1981, 13 (03) : 247 - 278