Modelling mobility aspects of security policies

5Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Hartel, P., Van Eck, P., Etalle, S., & Wieringa, R. (2005). Modelling mobility aspects of security policies. In Lecture Notes in Computer Science (Vol. 3362, pp. 172–191). Springer Verlag. https://doi.org/10.1007/978-3-540-30569-9_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free