Abstract
Lots of security mechanisms have been applied in current information systems to assure the confidentiality and integrality for the information processed. These mechanisms are selected in accordance with the certain security policies which should satisfy the system requirements. It is necessary to validate the security whether it really and truly protect the system. In this paper, we first define and formalize the validity and reliability for validation and verification criteria for the security validating. Then, we propose a model checking based method to validate the consistency and completeness for security policies. In our method, the system's behaviors are modeled as the transfer structure and the property is described using LTL formula, and the model checker SPIN is applied to verify and validate the security policy. The model checking based validation also can be used to generate the validate sequences. In the end, we approve the method proposed is valid and reliable for information system security validation. ©2010 IEEE.
Author supplied keywords
Cite
CITATION STYLE
Ma, J., Zhang, D., Xu, G., & Yang, Y. (2010). Model checking based security policy verification and validation. In Proceedings - 2010 2nd International Workshop on Intelligent Systems and Applications, ISA 2010. https://doi.org/10.1109/IWISA.2010.5473291
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.