Using Role-based Abstractions for Security Policy Specification with Deontic Logic

نویسنده

  • Rodolphe Ortalo
چکیده

This paper presents the use of role-based notions in the formal specification of a security policy. The formal method used is based on deontic logic, a logical formalism that seems particularly adapted for the specification of security properties. An outline of the main characteristics of this formalism and of the graphical notation used is presented through examples. The use of role-based abstractions for structuring the specification is studied particularly, and several methods are given to define and use roles in order to enhance the flexibility of the deontic logic security policy specification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using Deontic Logic for Security Policy Specification

This paper analyses the problem of specifying a security policy for organizations. First, various issues related to the problem of an adequate and rigorous specification of a security policy are outlined in a context where security requirements usually remain informal and are difficult to satisfy. Then, it is proposed to use a logical language, previously studied in the literature, that seems t...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Information Systems Security: Specification and Quantitative Evaluation

This paper presents a method for the specification and evaluation of the security of information systems. This method is based on an extension of deontic logic, a formal language adapted for this task. First, we outline briefly the overall guidelines of the method and the various aspects of the security policy specification process. Then, the formalism is defined and extensions are proposed. To...

متن کامل

Ma(dl): a Normative Logic for Authorization in Semantic-aware Environments

Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semanticaware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) l...

متن کامل

Deontic logic for the specification of system availability

We study the specification and the verification of availability policies. We first introduce the availability concept, and then deontic logic. Next we present some investigations about mixing temporal and deontic aspects, in order to specify both availability policies and system behavior. In the last part we focus on the verification of availability, especially using the UPPAAL tool for an illu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997