Formalizing physical security procedures

Catherine Meadows, Dusko Pavlovic

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
    23 Downloads (Pure)

    Abstract

    Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now increasingly expedited by computers, the problems of physical and social security are becoming technical problems. From various directions, many security researchers and practitioners have come to a realization that the areas such as transportation security, public and private space protection, or critical infrastructure defense, are in need of formalized engineering methodologies. Following this lead, we extended Protocol Derivation Logic (PDL) to Procedure Derivation Logic (still PDL). In contrast with a protocol, where some principals send and receive some messages, in a procedure they can also exchange and move some objects. For simplicity, in the present paper we actually focus on the security issues arising from traffic of objects, and leave the data flows, and the phenomena emerging from the interaction of data and objects, for future work. We illustrate our approach by applying it to a flawed airport security procedure described by Schneier.
    Original languageEnglish
    Title of host publicationSecurity and Trust Management
    Subtitle of host publication8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
    EditorsAudun Jøsang, Pierangela Samarati, Marinella Petrocchi
    Place of PublicationBerlin, Heidelberg
    PublisherSpringer
    Pages193-208
    Number of pages16
    ISBN (Electronic)978-3-642-38004-4
    ISBN (Print)978-3-642-38004-4
    DOIs
    Publication statusPublished - Sep 2012
    Event8th International Workshop on Security and Trust Management, STM 2012 - Pisa, Italy
    Duration: 13 Sep 201214 Sep 2012

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer
    Volume7783
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Workshop

    Workshop8th International Workshop on Security and Trust Management, STM 2012
    Period13/09/1214/09/12
    OtherSeptember 13-14, 2012

    Keywords

    • SCS-Cybersecurity
    • Physical procedure analysis
    • Physical security
    • Security policies
    • Formal security protocol analysis

    Fingerprint Dive into the research topics of 'Formalizing physical security procedures'. Together they form a unique fingerprint.

    Cite this