This paper proposes an algebraic formalism and a dedicated logic for computer systems and security policies specifications. A tableaubased proof system is then developed for assessing whether policies are satisfied for a given model of a computer system. A practical example and an implementation within a theorem prover show the effectiveness of our specification and verification technique.
CITATION STYLE
Pene, L., Hamza, L., & Adi, K. (2017). Compliance verification algorithm for computer systems security policies. In Lecture Notes in Business Information Processing (Vol. 289, pp. 96–115). Springer Verlag. https://doi.org/10.1007/978-3-319-59041-7_6
Mendeley helps you to discover research relevant for your work.