Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Hartel, P., Van Eck, P., Etalle, S., & Wieringa, R. (2005). Modelling mobility aspects of security policies. In Lecture Notes in Computer Science (Vol. 3362, pp. 172–191). Springer Verlag. https://doi.org/10.1007/978-3-540-30569-9_9
Mendeley helps you to discover research relevant for your work.