Skip to main content

A modal logical framework for security policies

  • Communications Session 7B Logic for AI
  • Conference paper
  • First Online:
Book cover Foundations of Intelligent Systems (ISMIS 1997)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1325))

Included in the following conference series:

Abstract

It turns out that security becomes more and more important in many information systems. In this paper, we are more specifically interested in confidentiality requirement. In this context, we show how knowledge representation technique based on formal logic can be used to propose a faithful model of confidentiality. Our approach is to develop a modal logic framework which combines doxastic and deontic logics. This framework enables to specify confidentiality policies -in particular, multilevel security policies- and express various types of security constraints including consistency, completeness and inference control constraints.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Denning. Cryptography and Data Security. Addison-Wesley; 1982.

    Google Scholar 

  2. J. Goguen and J. Meseguer. Unwinding and Inference Control. In IEEE Symposium on Security and Privacy, Oakland, 1984.

    Google Scholar 

  3. D. Sutherland. A Model of Information. In Proceedings of the 9th National Computer Security Conference, 1986.

    Google Scholar 

  4. P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):99–129, 1992.

    Google Scholar 

  5. X. Qian, M. Stickel, O. Karp, T. Lunt, and T. Garvey. Detection and Elimination of Inference Channels in Multilevel Database Systems. In IEEE Symposium on Security and Privacy, Oakland, 1993.

    Google Scholar 

  6. L. Binns. Inference Through Secondary Path Analysis. In Database Security, 6: Status and Prospects. North-Holland, 1993. Results of the IFIP WG 11.3 Workshop on Database Security.

    Google Scholar 

  7. J. Hale, J. Threet, and S. Shenoi. A Practical Formalism for Imprecise Inference Control. In Eighth Annual IFIP WG 11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 1994.

    Google Scholar 

  8. B. F. Chellas. Modal Logic: An Introduction. Cambridge University Press, 1988.

    Google Scholar 

  9. F. Cuppens and R. Demolombe. A Deontic Logic for Reasoning about Confidentiality. In M. Brown and J. Carmo, editors, Deontic Logic, Agency and Normative Systems, Workshops in Computing. Springer, 1996.

    Google Scholar 

  10. D. Brewer and M. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, Oakland, 1989.

    Google Scholar 

  11. F. Cuppens. Roles and Deontic Logic. In A. J. I. Jones and M. Sergot, editors, Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.

    Google Scholar 

  12. I. Pörn. Action Theory and Social Science; Some Formal Models, volume 120 of Synthese Library. D. Reidel, Dordrecht, 1977.

    Google Scholar 

  13. J. Carmo and A. I. J. Jones. Deontic database constraints and the characterization of recovery. In A. J. I. Jones and M. Sergot, editors, Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.

    Google Scholar 

  14. A.J.I. Jones and I. Pörn. Ideality, Sub-ideality and Deontic Logic. Synthese, 65, 1985.

    Google Scholar 

  15. C. Landwehr. Formal models for computer security. ACM Computing Surveys, 3:247–278, September 1981.

    Google Scholar 

  16. F. Cuppens. A Logical Analysis of Authorized and Prohibited Information Flows. In IEEE Symposium on Security and Privacy, Oakland, 1993.

    Google Scholar 

  17. F. Cuppens and R. Demolombe. Normative Conflicts in a Confidentiality Policy. In ECAI'94 Workshop on Artificial Normative Reasoning, Amsterdam, The Netherlands, 1994.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Zbigniew W. Raś Andrzej Skowron

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cuppens, F., Demolombe, R. (1997). A modal logical framework for security policies. In: Raś, Z.W., Skowron, A. (eds) Foundations of Intelligent Systems. ISMIS 1997. Lecture Notes in Computer Science, vol 1325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63614-5_56

Download citation

  • DOI: https://doi.org/10.1007/3-540-63614-5_56

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63614-4

  • Online ISBN: 978-3-540-69612-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics