Modelling mobility aspects of security policies

P.H. Hartel, P.A.T. Eck, van, S. Etalle, R.J. Wieringa

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)

    Abstract

    Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility.
    Original languageEnglish
    Title of host publicationConstruction and Analysis of Safe, Secure, and Interoperable Smart Devices (International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers)
    EditorsG. Barthe, L. Burdy, M. Huisman, J.L. Lanet, T. Muntean
    PublisherSpringer
    Pages172-191
    ISBN (Print)3-540-24287-2
    DOIs
    Publication statusPublished - 2005

    Publication series

    NameLecture Notes in Computer Science
    Volume3362
    ISSN (Print)0302-9743

    Fingerprint

    Dive into the research topics of 'Modelling mobility aspects of security policies'. Together they form a unique fingerprint.

    Cite this