Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software
mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility.
|Title of host publication||Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers)|
|Editors||G. Barthe, L. Burdy, M. Huisman, J.L. Lanet, T. Muntean|
|Publication status||Published - 2005|
|Name||Lecture Notes in Computer Science|