Modelling mobility aspects of security policies

Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roelf J. Wieringa

    Research output: Book/ReportReportProfessional

    56 Downloads (Pure)


    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.
    Original languageUndefined
    Place of PublicationEnschede
    PublisherCentre for Telematics and Information Technology (CTIT)
    Number of pages16
    Publication statusPublished - Jan 2004

    Publication series

    NameCTIT Technical Report Series
    ISSN (Print)1381-3625


    • METIS-222713
    • SCS-Cybersecurity
    • SCS-Services
    • EWI-5798
    • IR-49813

    Cite this

    Hartel, P. H., van Eck, P., Etalle, S., & Wieringa, R. J. (2004). Modelling mobility aspects of security policies. (CTIT Technical Report Series; No. 04-06). Enschede: Centre for Telematics and Information Technology (CTIT).