Specification, analysis and transformation of security policies via rewriting techniques - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Article Dans Une Revue Journal of Information Assurance and Security Année : 2011

Specification, analysis and transformation of security policies via rewriting techniques

Tony Bourdier

Résumé

Formal methods for the specification and analysis of security policies have drawn many attention recently. It is now well known that security policies can be represented using rewriting systems. These systems constitute an interesting formalism to prove properties while provides an operational way to evaluate authorization requests. In this paper, we propose to split the expression of security policies in two distinct elements: a security model and a configuration. The security model (expressed as an equational problem) describes how authorization requests must be evaluated depending on security information. The configuration (expressed as a rewriting system) assigns values to security information. This separation eases the formal analysis of security policies, and makes it possible to automatically convert a given policy to a new security model.
Fichier non déposé

Dates et versions

inria-00525761 , version 1 (14-10-2010)

Identifiants

  • HAL Id : inria-00525761 , version 1

Citer

Tony Bourdier. Specification, analysis and transformation of security policies via rewriting techniques. Journal of Information Assurance and Security, 2011, 6 (5), pp.357-368. ⟨inria-00525761⟩
70 Consultations
1 Téléchargements

Partager

Gmail Facebook X LinkedIn More