Rule-based Specification and Analysis of Security Policies - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2009

Rule-based Specification and Analysis of Security Policies

Résumé

We propose a formal framework for the specification and validation of security policies. A security policy responds to the authorisation requests of a system according to a certain number of rules and to the configuration of the system at the moment of the request. A system constrained by a security policy consists of two parts: on one hand, the set of rules describing the way the decisions are taken and on the other hand, the information used by the rules and the way they evolve in the system. We call the former the policy rules and the latter the security system. Policy rules are constrained rewrite rules, whose constraints are safe first-order formulas on finite domains, which provides enhanced expressive power compared to classical security policy specification approaches like the ones using Datalog, for example. Our specifications have an operational semantics based on transition and rewriting systems and are thus executable. This framework also provides a common formalism to define, compare and compose security systems and policies. We define transformations over security systems in order to perform validation of classical security properties.
Fichier principal
Vignette du fichier
paper.pdf (224.34 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)

Dates et versions

inria-00429240 , version 1 (02-11-2009)
inria-00429240 , version 2 (01-06-2010)
inria-00429240 , version 3 (30-07-2010)

Identifiants

  • HAL Id : inria-00429240 , version 2

Citer

Tony Bourdier, Horatiu Cirstea, Mathieu Jaume, Hélène Kirchner. Rule-based Specification and Analysis of Security Policies. 2009. ⟨inria-00429240v2⟩
160 Consultations
231 Téléchargements

Partager

Gmail Facebook X LinkedIn More