The new topicality of using Formal Models of Security Policy within the security engineering process

被引:0
|
作者
Koob, F [1 ]
Ullmann, M [1 ]
Wittmann, S [1 ]
机构
[1] Bundesamt Sicherheit Informat Tech, D-53133 Bonn, Germany
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper is focussed on the notion of a Formal Model of Security Policy (FMSP). This kind of model is essential when reasoning about the security of Information Technology devices like a specific IT-product or IT-system. Without an unambiguous definition of what security means, it is impossible to say whether a product is really secure.
引用
收藏
页码:302 / 310
页数:9
相关论文
共 50 条
  • [1] A Security Engineering Process for Systems of Systems using Security Patterns
    Ruiz, Jose Fran
    Rudolph, Carsten
    Mana, Antonio
    Arjona, Marcos
    [J]. 2014 8TH ANNUAL IEEE SYSTEMS CONFERENCE (SYSCON), 2014, : 8 - 11
  • [2] Implementation of a formal security policy refinement process in WBEM architecture
    Laborde, Romain
    Kamel, Michel
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (02) : 241 - 266
  • [3] Implementation of a Formal Security Policy Refinement Process in WBEM Architecture
    Romain Laborde
    Michel Kamel
    François Barrère
    Abdelmalek Benzekri
    [J]. Journal of Network and Systems Management, 2007, 15 : 241 - 266
  • [4] FORMAL MODELS FOR COMPUTER SECURITY
    LANDWEHR, CE
    [J]. COMPUTING SURVEYS, 1981, 13 (03): : 247 - 278
  • [5] Security Policy Alignment: A Formal Approach
    Pieters, Wolter
    Dimkov, Trajce
    Pavlovic, Dusko
    [J]. IEEE SYSTEMS JOURNAL, 2013, 7 (02): : 275 - 287
  • [6] A formal model of Healthcare Security Policy
    Cohen, B
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196
  • [7] Finite models for formal security proofs
    Goubault-Larrecq, Jean
    [J]. JOURNAL OF COMPUTER SECURITY, 2010, 18 (06) : 1247 - 1299
  • [8] Formal methods for security: Lightweight plug-in or new engineering discipline
    Stephan, Werner
    [J]. FM 2006: FORMAL METHODS, PROCEEDINGS, 2006, 4085 : 587 - 591
  • [9] Using Process Models to Understand Security Standards
    Moyon, Fabiola
    Mendez, Daniel
    Beckers, Kristian
    Klepper, Sebastian
    [J]. SOFSEM 2021: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2021, 12607 : 458 - 471
  • [10] An engineering process for security patterns application in component based models
    Bouaziz, Rahma
    Kallel, Slim
    Coulette, Bernard
    [J]. 2013 IEEE 22ND INTERNATIONAL WORKSHOP ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES (WETICE), 2013, : 231 - 236