Compliance verification algorithm for computer systems security policies

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper proposes an algebraic formalism and a dedicated logic for computer systems and security policies specifications. A tableaubased proof system is then developed for assessing whether policies are satisfied for a given model of a computer system. A practical example and an implementation within a theorem prover show the effectiveness of our specification and verification technique.

Cite

CITATION STYLE

APA

Pene, L., Hamza, L., & Adi, K. (2017). Compliance verification algorithm for computer systems security policies. In Lecture Notes in Business Information Processing (Vol. 289, pp. 96–115). Springer Verlag. https://doi.org/10.1007/978-3-319-59041-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free