Modelling mobility aspects of security policies

Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roelf J. Wieringa

Abstract

Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.
Original languageUndefined
Title of host publicationConstruction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)
EditorsG. Barthe, L. Burdy, Marieke Huisman, J.-L. Lanet, T. Muntean
Place of PublicationBerlin
PublisherSpringer Verlag
Pages172-191
Number of pages20
ISBN (Print)3-540-24287-2
DOIs
StatePublished - Mar 2004

Publication series

NameLecture Notes in Computer Science
PublisherSpringer-Verlag
Volume3362

Fingerprint

model
mobility
security policy
system
hardware
fashion
interest
case study
example
activity
problem
software

Keywords

  • EWI-770
  • SCS-Services
  • IR-66545
  • METIS-220306
  • SCS-Cybersecurity

Cite this

Hartel, P. H., van Eck, P., Etalle, S., & Wieringa, R. J. (2004). Modelling mobility aspects of security policies. In G. Barthe, L. Burdy, M. Huisman, J-L. Lanet, & T. Muntean (Eds.), Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS) (pp. 172-191). (Lecture Notes in Computer Science; Vol. 3362). Berlin: Springer Verlag. DOI: 10.1007/978-3-540-30569-9_9

Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J. / Modelling mobility aspects of security policies.

Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). ed. / G. Barthe; L. Burdy; Marieke Huisman; J.-L. Lanet; T. Muntean. Berlin : Springer Verlag, 2004. p. 172-191 (Lecture Notes in Computer Science; Vol. 3362).

Research output: ScientificConference contribution

@inbook{6129897cc4254278965286557a65b770,
title = "Modelling mobility aspects of security policies",
abstract = "Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.",
keywords = "EWI-770, SCS-Services, IR-66545, METIS-220306, SCS-Cybersecurity",
author = "Hartel, {Pieter H.} and {van Eck}, Pascal and Sandro Etalle and Wieringa, {Roelf J.}",
note = "Imported from DIES",
year = "2004",
month = "3",
doi = "10.1007/978-3-540-30569-9_9",
isbn = "3-540-24287-2",
series = "Lecture Notes in Computer Science",
publisher = "Springer Verlag",
pages = "172--191",
editor = "G. Barthe and L. Burdy and Marieke Huisman and J.-L. Lanet and T. Muntean",
booktitle = "Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)",

}

Hartel, PH, van Eck, P, Etalle, S & Wieringa, RJ 2004, Modelling mobility aspects of security policies. in G Barthe, L Burdy, M Huisman, J-L Lanet & T Muntean (eds), Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). Lecture Notes in Computer Science, vol. 3362, Springer Verlag, Berlin, pp. 172-191. DOI: 10.1007/978-3-540-30569-9_9

Modelling mobility aspects of security policies. / Hartel, Pieter H.; van Eck, Pascal; Etalle, Sandro; Wieringa, Roelf J.

Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). ed. / G. Barthe; L. Burdy; Marieke Huisman; J.-L. Lanet; T. Muntean. Berlin : Springer Verlag, 2004. p. 172-191 (Lecture Notes in Computer Science; Vol. 3362).

Research output: ScientificConference contribution

TY - CHAP

T1 - Modelling mobility aspects of security policies

AU - Hartel,Pieter H.

AU - van Eck,Pascal

AU - Etalle,Sandro

AU - Wieringa,Roelf J.

N1 - Imported from DIES

PY - 2004/3

Y1 - 2004/3

N2 - Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.

AB - Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.

KW - EWI-770

KW - SCS-Services

KW - IR-66545

KW - METIS-220306

KW - SCS-Cybersecurity

U2 - 10.1007/978-3-540-30569-9_9

DO - 10.1007/978-3-540-30569-9_9

M3 - Conference contribution

SN - 3-540-24287-2

T3 - Lecture Notes in Computer Science

SP - 172

EP - 191

BT - Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)

PB - Springer Verlag

ER -

Hartel PH, van Eck P, Etalle S, Wieringa RJ. Modelling mobility aspects of security policies. In Barthe G, Burdy L, Huisman M, Lanet J-L, Muntean T, editors, Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS). Berlin: Springer Verlag. 2004. p. 172-191. (Lecture Notes in Computer Science). Available from, DOI: 10.1007/978-3-540-30569-9_9