Security policy specification in logic

被引:0
|
作者
Barker, S [1 ]
机构
[1] Univ Westminster, Cavendish Sch Comp Sci, London W1M 8JS, England
关键词
information security; logic; automated reasoning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We show how clausal form logic may be used to protect the information contained in a computer system from unauthorized disclosure and modification. More specifically, we show how security policies based on discretionary access control (DAC) and mandatory access control (MAC) may be viewed as special subtheories of a clausal form theory which formulates a role-based access control (RBAC) policy. In this context, theorem-proving techniques are used to decide whether requests to access information are authorized or not.
引用
收藏
页码:1299 / 1304
页数:6
相关论文
共 50 条
  • [41] Security Policy Refinement: High-Level Specification to Low-Level Implementation
    Yang, Xia
    Alves-Foss, Jim
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 502 - 511
  • [42] PROCESS SPECIFICATION OF LOGIC PROGRAMS
    RAMANUJAM, R
    SHYAMASUNDAR, RK
    LECTURE NOTES IN COMPUTER SCIENCE, 1984, 181 : 31 - 43
  • [43] The Logic of Hereditary Harrop Formulas as a Specification Logic for Hybrid
    Battell, Chelsea
    Felty, Amy
    PROCEEDINGS OF THE ELEVENTH WORKSHOP ON LOGICAL FRAMEWORKS AND META-LANGUAGES: THEORY AND PRACTICE (LFMTP 2016), 2016,
  • [44] FROM POLICY TO SPECIFICATION
    PUTTER, P
    ROOS, JD
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 1 : 441 - 448
  • [45] THE SPECIFICATION AND MODELING OF COMPUTER SECURITY
    MCLEAN, J
    COMPUTER, 1990, 23 (01) : 9 - 16
  • [46] MIRO - VISUAL SPECIFICATION OF SECURITY
    HEYDON, A
    MAIMONE, MW
    TYGAR, JD
    WING, JM
    ZAREMSKI, AM
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (10) : 1185 - 1197
  • [47] Action systems for security specification
    Sinclair, J
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 102 - 113
  • [48] Security Specification at Process Level
    Chollet, Stephanie
    Lalanda, Philippe
    2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 1, 2008, : 165 - 172
  • [49] Symbolic backward reachability with effectively propositional logic Applications to security policy analysis
    Ranise, Silvio
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 42 (01) : 24 - 45
  • [50] Specification of security constraint in UML
    Fernández-Medina, E
    Piattini, M
    Serrano, MA
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 163 - 171