Modelling mobility aspects of security policies

Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roelf J. Wieringa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

    59 Downloads (Pure)

    Abstract

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.
    Original languageUndefined
    Title of host publicationConstruction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)
    EditorsG. Barthe, L. Burdy, Marieke Huisman, J.-L. Lanet, T. Muntean
    Place of PublicationBerlin
    PublisherSpringer
    Pages172-191
    Number of pages20
    ISBN (Print)3-540-24287-2
    DOIs
    Publication statusPublished - Mar 2004

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer-Verlag
    Volume3362

    Keywords

    • EWI-770
    • SCS-Services
    • IR-66545
    • METIS-220306
    • SCS-Cybersecurity

    Cite this

    Hartel, P. H., van Eck, P., Etalle, S., & Wieringa, R. J. (2004). Modelling mobility aspects of security policies. In G. Barthe, L. Burdy, M. Huisman, J-L. Lanet, & T. Muntean (Eds.), Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS) (pp. 172-191). (Lecture Notes in Computer Science; Vol. 3362). Berlin: Springer. https://doi.org/10.1007/978-3-540-30569-9_9
    Hartel, Pieter H. ; van Eck, Pascal ; Etalle, Sandro ; Wieringa, Roelf J. / Modelling mobility aspects of security policies. Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). editor / G. Barthe ; L. Burdy ; Marieke Huisman ; J.-L. Lanet ; T. Muntean. Berlin : Springer, 2004. pp. 172-191 (Lecture Notes in Computer Science).
    @inproceedings{6129897cc4254278965286557a65b770,
    title = "Modelling mobility aspects of security policies",
    abstract = "Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.",
    keywords = "EWI-770, SCS-Services, IR-66545, METIS-220306, SCS-Cybersecurity",
    author = "Hartel, {Pieter H.} and {van Eck}, Pascal and Sandro Etalle and Wieringa, {Roelf J.}",
    note = "Imported from DIES",
    year = "2004",
    month = "3",
    doi = "10.1007/978-3-540-30569-9_9",
    language = "Undefined",
    isbn = "3-540-24287-2",
    series = "Lecture Notes in Computer Science",
    publisher = "Springer",
    pages = "172--191",
    editor = "G. Barthe and L. Burdy and Marieke Huisman and J.-L. Lanet and T. Muntean",
    booktitle = "Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)",

    }

    Hartel, PH, van Eck, P, Etalle, S & Wieringa, RJ 2004, Modelling mobility aspects of security policies. in G Barthe, L Burdy, M Huisman, J-L Lanet & T Muntean (eds), Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). Lecture Notes in Computer Science, vol. 3362, Springer, Berlin, pp. 172-191. https://doi.org/10.1007/978-3-540-30569-9_9

    Modelling mobility aspects of security policies. / Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

    Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). ed. / G. Barthe; L. Burdy; Marieke Huisman; J.-L. Lanet; T. Muntean. Berlin : Springer, 2004. p. 172-191 (Lecture Notes in Computer Science; Vol. 3362).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

    TY - GEN

    T1 - Modelling mobility aspects of security policies

    AU - Hartel, Pieter H.

    AU - van Eck, Pascal

    AU - Etalle, Sandro

    AU - Wieringa, Roelf J.

    N1 - Imported from DIES

    PY - 2004/3

    Y1 - 2004/3

    N2 - Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.

    AB - Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.

    KW - EWI-770

    KW - SCS-Services

    KW - IR-66545

    KW - METIS-220306

    KW - SCS-Cybersecurity

    U2 - 10.1007/978-3-540-30569-9_9

    DO - 10.1007/978-3-540-30569-9_9

    M3 - Conference contribution

    SN - 3-540-24287-2

    T3 - Lecture Notes in Computer Science

    SP - 172

    EP - 191

    BT - Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)

    A2 - Barthe, G.

    A2 - Burdy, L.

    A2 - Huisman, Marieke

    A2 - Lanet, J.-L.

    A2 - Muntean, T.

    PB - Springer

    CY - Berlin

    ER -

    Hartel PH, van Eck P, Etalle S, Wieringa RJ. Modelling mobility aspects of security policies. In Barthe G, Burdy L, Huisman M, Lanet J-L, Muntean T, editors, Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). Berlin: Springer. 2004. p. 172-191. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-540-30569-9_9