Taking into account functional models in the validation of IS security policies

18Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. We suggest to translate both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. We show how various kinds of constraints can be expressed and animated in this context. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Ledru, Y., Idani, A., Milhau, J., Qamar, N., Laleau, R., Richier, J. L., & Labiadh, M. A. (2011). Taking into account functional models in the validation of IS security policies. In Lecture Notes in Business Information Processing (Vol. 83 LNBIP, pp. 592–606). Springer Verlag. https://doi.org/10.1007/978-3-642-22056-2_62

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free