Security Policy Compliance with Violation Management

被引:0
|
作者
Brunel, Julien [1 ]
Cuppens, Frederic
Cuppens-Boulahia, Nora
Sans, Thierry
Bodeveix, Jean-Paul [1 ]
机构
[1] Univ Toulouse 3, Inst Rech Informat Toulouse, F-31062 Toulouse, France
来源
FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING | 2007年
关键词
deontic logic; labeled kripke structure; security policy; temporal logic; violation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the information system enforces its associated security policy if and only if actions executed in this system are permitted by the policy (if the policy is closed) or not prohibited (if the policy is open) and every obligatory actions are actually executed in the system (no violation of obligations). In this paper, we investigate a more sophisticated approach in which an information system specification is compliant with its security policy even though some security requirements may be violated. Our proposal is to consider that this is acceptable when the security policy specifies additional requirements that apply in case of violation of other security requirements. In this case, we formally define conditions to be, satisfied by an information system to comply with its security policy. We then present a proof-based approach to check if these conditions are enforced.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [31] Employees' BYOD Security Policy Compliance in the Public Sector
    Palanisamy, Rathika
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024, 64 (01) : 62 - 77
  • [32] Leader power and employees’ information security policy compliance
    Hyungjin Lukas Kim
    HanByeol Stella Choi
    Jinyoung Han
    Security Journal, 2019, 32 : 391 - 409
  • [33] Information security policy compliance: a replication study in Ethiopia
    Aebissa, Berhanu
    Dhillon, Gurpreet
    Meshesha, Million
    INFORMATION AND COMPUTER SECURITY, 2024,
  • [34] A First Step towards Security Policy Compliance of Connectors
    Sun Meng
    FUNDAMENTALS OF SOFTWARE ENGINEERING, 2010, 5961 : 447 - 454
  • [35] Security and management policy specification
    Sloman, M
    Lupu, E
    IEEE NETWORK, 2002, 16 (02): : 10 - 19
  • [36] Holistic Information Security Management and Compliance Framework
    Grigaliunas, Sarunas
    Schmidt, Michael
    Bruzgiene, Rasa
    Smyrli, Panayiota
    Andreou, Stephanos
    Lopata, Audrius
    ELECTRONICS, 2024, 13 (19)
  • [37] Treaty Compliance and Violation
    Simmons, Beth
    ANNUAL REVIEW OF POLITICAL SCIENCE, VOL 13, 2010, 13 : 273 - 296
  • [38] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [39] Social Factors in Policy Compliance - Evidence found in Literature to Assist the Development of Policies in Information Security Management
    Milicevic, Danijel
    Goeken, Matthias
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 4476 - 4484
  • [40] Information Security Governance - Compliance management vs operational management
    von Solms, SH
    COMPUTERS & SECURITY, 2005, 24 (06) : 443 - 447