Taking into Account Functional Models in the Validation of IS Security Policies

Abstract : Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. We suggest to translate both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. We show how various kinds of constraints can be expressed and animated in this context.
Document type :
Conference papers
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-00860806
Contributor : Yves Ledru <>
Submitted on : Wednesday, September 11, 2013 - 6:58:44 PM
Last modification on : Thursday, October 11, 2018 - 8:48:04 AM

Identifiers

Citation

Yves Ledru, Akram Idani, Jérémy Milhau, Muhammad Nafees Qamar, Régine Laleau, et al.. Taking into Account Functional Models in the Validation of IS Security Policies. WISSE 2011 - 1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. pp.592-606, ⟨10.1007/978-3-642-22056-2_62⟩. ⟨hal-00860806⟩

Share

Metrics

Record views

276