Security policy specification in logic

被引:0
|
作者
Barker, S [1 ]
机构
[1] Univ Westminster, Cavendish Sch Comp Sci, London W1M 8JS, England
关键词
information security; logic; automated reasoning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We show how clausal form logic may be used to protect the information contained in a computer system from unauthorized disclosure and modification. More specifically, we show how security policies based on discretionary access control (DAC) and mandatory access control (MAC) may be viewed as special subtheories of a clausal form theory which formulates a role-based access control (RBAC) policy. In this context, theorem-proving techniques are used to decide whether requests to access information are authorized or not.
引用
收藏
页码:1299 / 1304
页数:6
相关论文
共 50 条
  • [1] Security and management policy specification
    Sloman, M
    Lupu, E
    IEEE NETWORK, 2002, 16 (02): : 10 - 19
  • [2] Security policy specification for home network
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Wook
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (06) : 372 - 378
  • [3] SPECIFICATION AND VALIDATION OF A SECURITY POLICY MODEL
    BOSWELL, A
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (02) : 63 - 68
  • [4] Security policy specification and integration in business collaboration
    He, Daisy Daiqin
    Yang, Jian
    2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2007, : 20 - +
  • [5] Converting QoS policy specification into fuzzy logic parameters
    Fernandez, MP
    Pedroza, ADP
    Rezende, JF
    PROVIDING QUALITY OF SERVICE IN HETEROGENEOUS ENVIRONMENTS, VOLS 5A AND 5B, 2003, 5A-B : 339 - 348
  • [6] Using argumentation logic for firewall policy specification and analysis
    Bandara, Arosha K.
    Kakas, Antonis
    Lupu, Emil C.
    Russo, Alessandra
    LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4269 : 185 - 196
  • [7] A logic specification and implementation approach for object oriented database security
    Ni Xianjun
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 461 - 464
  • [8] A flexible method for information system security policy specification
    Ortalo, R
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 67 - 84
  • [9] Specification and enforcement of flexible security policy for active cooperation
    Sun, Yuqing
    Gong, Bin
    Meng, Xiangxu
    Lin, Zongkai
    Bertino, Elisa
    INFORMATION SCIENCES, 2009, 179 (15) : 2629 - 2642
  • [10] A formal framework for agent itinerary specification, security reasoning and logic analysis
    Lu, SY
    Xu, CZ
    25TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS, PROCEEDINGS, 2005, : 580 - 586