Abstract
It turns out that security becomes more and more important in many information systems. In this paper, we are more specifically interested in confidentiality requirement. In this context, we show how knowledge representation technique based on formal logic can be used to propose a faithful model of confidentiality. Our approach is to develop a modal logic framework which combines doxastic and deontic logics. This framework enables to specify confidentiality policies -in particular, multilevel security policies- and express various types of security constraints including consistency, completeness and inference control constraints.
Preview
Unable to display preview. Download preview PDF.
References
D. Denning. Cryptography and Data Security. Addison-Wesley; 1982.
J. Goguen and J. Meseguer. Unwinding and Inference Control. In IEEE Symposium on Security and Privacy, Oakland, 1984.
D. Sutherland. A Model of Information. In Proceedings of the 9th National Computer Security Conference, 1986.
P. Bieber and F. Cuppens. A Logical View of Secure Dependencies. Journal of Computer Security, 1(1):99–129, 1992.
X. Qian, M. Stickel, O. Karp, T. Lunt, and T. Garvey. Detection and Elimination of Inference Channels in Multilevel Database Systems. In IEEE Symposium on Security and Privacy, Oakland, 1993.
L. Binns. Inference Through Secondary Path Analysis. In Database Security, 6: Status and Prospects. North-Holland, 1993. Results of the IFIP WG 11.3 Workshop on Database Security.
J. Hale, J. Threet, and S. Shenoi. A Practical Formalism for Imprecise Inference Control. In Eighth Annual IFIP WG 11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 1994.
B. F. Chellas. Modal Logic: An Introduction. Cambridge University Press, 1988.
F. Cuppens and R. Demolombe. A Deontic Logic for Reasoning about Confidentiality. In M. Brown and J. Carmo, editors, Deontic Logic, Agency and Normative Systems, Workshops in Computing. Springer, 1996.
D. Brewer and M. Nash. The Chinese wall security policy. In IEEE Symposium on Security and Privacy, Oakland, 1989.
F. Cuppens. Roles and Deontic Logic. In A. J. I. Jones and M. Sergot, editors, Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.
I. Pörn. Action Theory and Social Science; Some Formal Models, volume 120 of Synthese Library. D. Reidel, Dordrecht, 1977.
J. Carmo and A. I. J. Jones. Deontic database constraints and the characterization of recovery. In A. J. I. Jones and M. Sergot, editors, Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.
A.J.I. Jones and I. Pörn. Ideality, Sub-ideality and Deontic Logic. Synthese, 65, 1985.
C. Landwehr. Formal models for computer security. ACM Computing Surveys, 3:247–278, September 1981.
F. Cuppens. A Logical Analysis of Authorized and Prohibited Information Flows. In IEEE Symposium on Security and Privacy, Oakland, 1993.
F. Cuppens and R. Demolombe. Normative Conflicts in a Confidentiality Policy. In ECAI'94 Workshop on Artificial Normative Reasoning, Amsterdam, The Netherlands, 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cuppens, F., Demolombe, R. (1997). A modal logical framework for security policies. In: Raś, Z.W., Skowron, A. (eds) Foundations of Intelligent Systems. ISMIS 1997. Lecture Notes in Computer Science, vol 1325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-63614-5_56
Download citation
DOI: https://doi.org/10.1007/3-540-63614-5_56
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63614-4
Online ISBN: 978-3-540-69612-4
eBook Packages: Springer Book Archive