Using Role-based Abstractions for Security Policy Specification with Deontic Logic
نویسنده
چکیده
This paper presents the use of role-based notions in the formal specification of a security policy. The formal method used is based on deontic logic, a logical formalism that seems particularly adapted for the specification of security properties. An outline of the main characteristics of this formalism and of the graphical notation used is presented through examples. The use of role-based abstractions for structuring the specification is studied particularly, and several methods are given to define and use roles in order to enhance the flexibility of the deontic logic security policy specification.
منابع مشابه
Using Deontic Logic for Security Policy Specification
This paper analyses the problem of specifying a security policy for organizations. First, various issues related to the problem of an adequate and rigorous specification of a security policy are outlined in a context where security requirements usually remain informal and are difficult to satisfy. Then, it is proposed to use a logical language, previously studied in the literature, that seems t...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملInformation Systems Security: Specification and Quantitative Evaluation
This paper presents a method for the specification and evaluation of the security of information systems. This method is based on an extension of deontic logic, a formal language adapted for this task. First, we outline briefly the overall guidelines of the method and the various aspects of the security policy specification process. Then, the formalism is defined and extensions are proposed. To...
متن کاملMa(dl): a Normative Logic for Authorization in Semantic-aware Environments
Semantic technology provides an abstraction layer above existing computational environments, especially the Web, to give information a well-defined meaning. Moving toward semanticaware environments imposes new security requirements. One of the most important requirement is the authorization and security policy inference based on the existing semantic relationships in the abstract (conceptual) l...
متن کاملDeontic logic for the specification of system availability
We study the specification and the verification of availability policies. We first introduce the availability concept, and then deontic logic. Next we present some investigations about mixing temporal and deontic aspects, in order to specify both availability policies and system behavior. In the last part we focus on the verification of availability, especially using the UPPAAL tool for an illu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1997