Security policy specification in logic

被引:0
|
作者
Barker, S [1 ]
机构
[1] Univ Westminster, Cavendish Sch Comp Sci, London W1M 8JS, England
关键词
information security; logic; automated reasoning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We show how clausal form logic may be used to protect the information contained in a computer system from unauthorized disclosure and modification. More specifically, we show how security policies based on discretionary access control (DAC) and mandatory access control (MAC) may be viewed as special subtheories of a clausal form theory which formulates a role-based access control (RBAC) policy. In this context, theorem-proving techniques are used to decide whether requests to access information are authorized or not.
引用
收藏
页码:1299 / 1304
页数:6
相关论文
共 50 条
  • [21] Object specification logic
    Sernadas, A
    Sernadas, C
    Costa, JF
    JOURNAL OF LOGIC AND COMPUTATION, 1995, 5 (05) : 603 - 630
  • [22] AN INTRODUCTION TO SPECIFICATION LOGIC
    REYNOLDS, JC
    LECTURE NOTES IN COMPUTER SCIENCE, 1984, 164 : 442 - 442
  • [23] Deontic STIT logic, from logical paradox to security policy
    Qiu, Lirong
    Sun, Xin
    SOFT COMPUTING, 2018, 22 (03) : 751 - 757
  • [24] Deontic STIT logic, from logical paradox to security policy
    Lirong Qiu
    Xin Sun
    Soft Computing, 2018, 22 : 751 - 757
  • [25] Examining Waltzian Structural Logic and Japan's Security Policy
    Gnanagurunathan, A. D.
    INDIA QUARTERLY-A JOURNAL OF INTERNATIONAL AFFAIRS, 2020, 76 (01): : 89 - 102
  • [26] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [27] Validation of a Security Policy by the Test of its Formal B Specification - a Case Study
    Ledru, Yves
    Idani, Akram
    Richier, Jean-Luc
    2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, : 6 - 12
  • [28] THE RELATION BETWEEN LOGIC PROGRAMMING AND LOGIC SPECIFICATION
    KOWALSKI, R
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 1984, 312 (1522): : 345 - 361
  • [29] Specification for security Orchestration
    Goutam, Aradhana
    Kamal, Raj
    Ingle, Maya
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 429 - 441
  • [30] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434