Model-driven security policy deployment: Property oriented approach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We address the issue of formally validating the deployment of access control security policies. We show how the use of a formal expression of the security requirements, related to a given system, ensures the deployment of an anomaly free abstract security policy. We also describe how to develop appropriate algorithms by using a theorem proving approach with a modeling language allowing the specification of the system, of the link between the system and the policy, and of certain target security properties. The result is a set of proved algorithms that constitute the certified technique for a reliable security policy deployment.

Original languageEnglish
Title of host publicationEngineering Secure Software and Systems - Second International Symposium, ESSoS 2010, Proceedings
Pages123-139
Number of pages17
DOIs
Publication statusPublished - 22 Mar 2010
Externally publishedYes
Event2nd International Symposium on Engineering Secure Software and Systems, ESSoS 2010 - Pisa, Italy
Duration: 3 Feb 20104 Feb 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5965 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Symposium on Engineering Secure Software and Systems, ESSoS 2010
Country/TerritoryItaly
CityPisa
Period3/02/104/02/10

Fingerprint

Dive into the research topics of 'Model-driven security policy deployment: Property oriented approach'. Together they form a unique fingerprint.

Cite this