Nomad: a security model with non atomic actions and deadlines

作者: F. Cuppens , N. Cuppens-Boulahia , T. Sans

DOI: 10.1109/CSFW.2005.20

关键词:

摘要: Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient express properties such as availability obligations must be also considered. By contrast prohibitions, are often associated with deadlines bounded time requirements. In case, a violation only occurs if the obliged action performed before deadline. On other hand, when specifying high level policies, it convenient consider abstract non atomic actions. Since most access control mechanisms deal actions read or write, these decomposed into more basic ones. paper, we define formal model called Nomad privileges on This combines deontic temporal logics. Nomad, conditional deadlines. We formally analyze how can elementary

参考文章(16)
E. Allen EMERSON, Temporal and modal logic Handbook of theoretical computer science (vol. B). pp. 995- 1072 ,(1991) , 10.1016/B978-0-444-88074-1.50021-4
Vijayalakshmi Atluri, Wei-Kuang Huang, A Petri net based safety analysis of workflow authorization models^1 Journal of Computer Security. ,vol. 8, pp. 209- 240 ,(2000) , 10.3233/JCS-2000-82-307
D. Elliott Bell, Leonard J. La Padula, Secure Computer System: Unified Exposition and Multics Interpretation Defense Technical Information Center. ,(1976) , 10.21236/ADA023588
Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca, A logical framework for reasoning about access control models ACM Transactions on Information and System Security. ,vol. 6, pp. 71- 127 ,(2003) , 10.1145/605434.605437
J.-J. Ch. Meyer, A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic. Notre Dame Journal of Formal Logic. ,vol. 29, pp. 109- 136 ,(1987) , 10.1305/NDJFL/1093637776
Michael A. Harrison, Walter L. Ruzzo, Jeffrey D. Ullman, Protection in operating systems Communications of The ACM. ,vol. 19, pp. 461- 471 ,(1976) , 10.1145/360303.360333
Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben Ghorbel, High Level Conflict Management Strategies in Advanced Access Control Models Electronic Notes in Theoretical Computer Science. ,vol. 186, pp. 3- 26 ,(2007) , 10.1016/J.ENTCS.2007.01.064
L. Cholvy, F. Cuppens, Analyzing consistency of security policies ieee symposium on security and privacy. pp. 103- 112 ,(1997) , 10.1109/SECPRI.1997.601324
C.-F. Yu, V.D. Gligor, A specification and verification method for preventing denial of service IEEE Transactions on Software Engineering. ,vol. 16, pp. 581- 592 ,(1990) , 10.1109/32.55087
C. Bettini, Obligation monitoring in policy management policies for distributed systems and networks. pp. 2- 12 ,(2002) , 10.1109/POLICY.2002.1011288