Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems

Gabriele Lenzini, Sjouke Mauw, Samir Ouchani

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Abstract

    A crucial question for an ICT organization wishing to improve its security is whether a security policy together with physical access controls protects from socio-technical threats. We study this question formally. We model the information flow defined by what the organization’s employees do (copy, move, and destroy information) and propose an algorithm that enforces a policy on the model, before checking against an adversary if a security requirement holds.
    Original languageEnglish
    Title of host publication12th International Workshop on Security and Trust Management, STM 2016
    EditorsGilles Barthe, Evangelos Markatos, Pierangela Samarati
    Place of PublicationBerlin
    PublisherSpringer
    Pages170-178
    Number of pages9
    ISBN (Print)9783319465975
    DOIs
    Publication statusPublished - 17 Sep 2016
    Event12th International Workshop on Security and Trust Management, STM 2016 - Heraklion, Crete, Greece
    Duration: 17 Sep 2016 → …

    Publication series

    NameLecture notes in computer science
    PublisherSpringer
    Volume9871
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Conference

    Conference12th International Workshop on Security and Trust Management, STM 2016
    CityHeraklion, Crete, Greece
    Period17/09/16 → …

    Keywords

    • EC Grant Agreement nr.: FP7/318003
    • EC Grant Agreement nr.: FP7/2007-2013
    • IR-101603
    • Socio-Technical-Physical Systems · Modelling security and policies
    • METIS-318546
    • EWI-27280

    Fingerprint Dive into the research topics of 'Analysing the Efficacy of Security Policies in Cyber-Physical Socio-Technical Systems'. Together they form a unique fingerprint.

    Cite this