Taking into Account Functional Models in the Validation of IS Security Policies

Abstract : Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. We suggest to translate both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. We show how various kinds of constraints can be expressed and animated in this context.
Type de document :
Communication dans un congrès
Salinesi, Camille and Pastor, Oscar. WISSE 2011 - 1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. Springer, 83, pp.592-606, 2011, Lecture Notes in Business Information Processing. 〈10.1007/978-3-642-22056-2_62〉
Liste complète des métadonnées

https://hal.archives-ouvertes.fr/hal-00860806
Contributeur : Yves Ledru <>
Soumis le : mercredi 11 septembre 2013 - 18:58:44
Dernière modification le : jeudi 11 octobre 2018 - 08:48:04

Identifiants

Citation

Yves Ledru, Akram Idani, Jérémy Milhau, Muhammad Nafees Qamar, Régine Laleau, et al.. Taking into Account Functional Models in the Validation of IS Security Policies. Salinesi, Camille and Pastor, Oscar. WISSE 2011 - 1st International Workshop on Information Systems Security Engineering (in CAiSE 2011), Jun 2011, London, United Kingdom. Springer, 83, pp.592-606, 2011, Lecture Notes in Business Information Processing. 〈10.1007/978-3-642-22056-2_62〉. 〈hal-00860806〉

Partager

Métriques

Consultations de la notice

268