Abstract
This paper starts from a logical framework intended to define and analyse information exchange policies for critical information systems. A layer is introduced to express organisational information exchange policies at abstract level. Properties are defined within this organisational layer, in particular information permeability through organisations. More efficiency is expected for policies expression and analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abou El Kalam, A., Benferhat, S., Miège, A., El Baida, R., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Lake Come, Italy, June 4–6, 2003
Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Héritage de privilèges dans le modèle Or-BAC : application dans un environnement réseau. In: SSTIC 2004 : Symposium sur la Sécurité des Technologies de l’information et des Communications (2004)
Feldmeier, C.J.: Limiting hierarchical inheritance of permissions in access control models. In: ISA 767 Secure Electronic Commerce (2006)
Crampton, J.: On permissions, inheritance and role hierarchies. In: 10th ACM Conference on Computer and Communication Security (2003)
Delmas, R., Polacsek, T.: Formal methods for exchange policy specification. In: Salinesi, C., Norrie, M.C., Pastor, Ó. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 288–303. Springer, Heidelberg (2013)
Pacheco, O., Carmo, J.: A Role Based Model for the normative specification of organized collective agency and agent interaction. Journal of Autonomous Agents and Multi-Agent Systems 6, 145–184 (2003)
Glassey, O., Chappelet, J.L.: Comparaison de trois techniques de modélisation de processus : ADONIS, OSSAD et UML. Working paper of l’IDHEAP/14, UER Management public-Systèmes d’informations, Lausanne (2002)
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)
Cholvy, L., Garion, C., Saurel, C.: Information sharing policies for coalition systems. In: NATO RTO-IST Symposium on Dynamic Communications management, Budapest, October 2006
Cuppens, F., Cholvy, L., Saurel, C., Carrère, J.: Merging regulations: analysis of a practical example. In: Data and Knowledge Fusion, Special issue of International Journal of Intelligent Systems, vol. 16. J. Wiley and Sons Pub. (2001)
Cholvy, L., Cuppens, F.: Analyzing Consistency of Security Policies. IEEE Symposium on Security and Privacy, pp. 103–112 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Saurel, C. (2015). Information Exchange Policies at an Organisational Level : Formal Expression and Analysis. In: Morzy, T., Valduriez, P., Bellatreche, L. (eds) New Trends in Databases and Information Systems. ADBIS 2015. Communications in Computer and Information Science, vol 539. Springer, Cham. https://doi.org/10.1007/978-3-319-23201-0_55
Download citation
DOI: https://doi.org/10.1007/978-3-319-23201-0_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23200-3
Online ISBN: 978-3-319-23201-0
eBook Packages: Computer ScienceComputer Science (R0)