Skip to Main content Skip to Navigation
Conference papers

Taking into Account Functional Models in the Validation of IS Security Policies

Abstract : Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. We suggest to translate both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. We show how various kinds of constraints can be expressed and animated in this context.
Document type :
Conference papers
Complete list of metadata
Contributor : Yves Ledru Connect in order to contact the contributor
Submitted on : Wednesday, September 11, 2013 - 6:58:44 PM
Last modification on : Tuesday, October 19, 2021 - 11:17:09 PM

Links full text




Yves Ledru, Akram Idani, Jérémy Milhau, Muhammad Nafees Qamar, Régine Laleau, et al.. Taking into Account Functional Models in the Validation of IS Security Policies. WISSE 2011 - 1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. pp.592-606, ⟨10.1007/978-3-642-22056-2_62⟩. ⟨hal-00860806⟩



Record views