Modelling mobility aspects of security policies

Pieter H. Hartel, Pascal van Eck, Sandro Etalle, Roelf J. Wieringa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

    5 Citations (Scopus)
    169 Downloads (Pure)

    Abstract

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.
    Original languageUndefined
    Title of host publicationConstruction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS)
    EditorsG. Barthe, L. Burdy, Marieke Huisman, J.-L. Lanet, T. Muntean
    Place of PublicationBerlin
    PublisherSpringer
    Pages172-191
    Number of pages20
    ISBN (Print)3-540-24287-2
    DOIs
    Publication statusPublished - Mar 2004
    Event1st International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2004 - Marseille, France
    Duration: 10 Mar 200413 Mar 2004
    Conference number: 1

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer-Verlag
    Volume3362

    Conference

    Conference1st International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2004
    Abbreviated titleCASSIS 2004
    Country/TerritoryFrance
    CityMarseille
    Period10/03/0413/03/04

    Keywords

    • EWI-770
    • SCS-Services
    • IR-66545
    • METIS-220306
    • SCS-Cybersecurity

    Cite this