Abstract
We use a number of the examples presented in [Ting 1990] to illustrate how the formal theory of normative positions may serve as a tool for clarifying, and making precise, the specification of security requirements, particularly in regard to access control. We describe the basic features of the theory of normative positions (which has its roots in the analytical theory of law), and of the modal logics (deontic and action logics) involved in its formulation. We then indicate three levels of software we have under development, which aim to turn the analytical procedures into a practical tool. Our concluding remarks relate our discussion of Ting's examples to some particular issues in the formal specification of computer systems.
On leave from Norwegian Research Centre for Computers and Law, and Department of Philosophy, University of Oslo.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Bieber, P., Cuppens, F. [1991] Computer Security Policies and Deontic Logic. Proc. First International Workshop on Deontic Logic in Computer Science (DEON '91), Amsterdam, December 1991.
Chisholm, R.M. [1963] Contrary-to-duty imperatives and deontic logic. Analysis 24.
Elgesem, D. [1992] Action Theory and Modal Logic, Doctoral Thesis, Dept. of Philosophy, University of Oslo, Norway.
Glasgow, J., McEwen, G., Panangaden, P. [1990] A Logic for Reasoning about Security. Proc. of the Computer Security Foundations Workshop, Franconia 1990.
Jones, A.J.I., Pörn, I. [1985] Ideality, sub-ideality and deontic logic. Synthese 65, 1985.
Jones, A.J.I, Pörn, I. [1991] On the logic of deontic conditionals. Proc. First International Workshop on Deontic Logic in Computer Science (DEON '91), Amsterdam, December 1991.
Jones, A.J.I., Sergot, M.J. [1991] On the role of deontic logic in the characterization of normative systems. Proc. First International Workshop on Deontic Logic in Computer Science (DEON '91), Amsterdam, December 1991.
Jones, A.J.I., Sergot, M.J. [1992] Deontic logic in the representation of law: Towards a methodology. Artificial Intelligence and Law, Kluwer. To appear 1992.
Hilpinen, R. [1981] New Studies in Deontic Logic (Hilpinen, R., ed.). Synthese Library 152, D.Reidel, Dordrecht, Holland.
Kanger, S. [1972] Law and Logic. Theoria 38,1972.
Kanger, S. [1985] On Realization of Human Rights. In Action, Logic and Social Theory (Holmström,G., Jones, A.J.I., eds). Acta Philosophica Fennica, Vol. 38.
Kanger, S., Kanger, H. [1966] Rights and Parliamentarism. Theoria 32,1966.
Lindahl, L. [1977] Position and Change — A Study in Law and Logic. Synthese Library 112, D.Reidel, Dordrecht, Holland.
Meyer, J.-J.Ch., Wieringa, R.J. [1991] Proc. First International Workshop on Deontic Logic in Computer Science (DEON '91) (Meyer, J.-J.Ch., Wieringa, R.J., eds.), Amsterdam, December 1991.
Minsky, N.H., Lockman, A. [1985] Ensuring integrity by adding obligations to privileges. Proc. 8th International Conference on Software Engineering, August 1985, pp 92–102.
Morris, P., McDermid, J. [1991] Security and Normative Rights. Proc. First International Workshop on Deontic Logic in Computer Science (DEON '91), Amsterdam, December 1991.
Pörn, I. [1970] The Logic of Power. Blackwells, Oxford, 1970.
Pörn, I. [1977] Action Theory and Social Science: Some Formal Models. Synthese Library 120, D. Reidel, Dordrecht.
Syverson, P. [1990] Formal Semantics for Logics of Cryptographic Protocols. Proc. of the Computer Security Foundations Workshop, Franconia 1990.
Ting, T.C. [1990] Application Information Security Semantics: A Case of Mental Health Delivery. In Database Security: Status and Prospects III (Spooner, D.L., Landwehr, CE., eds.). North Holland, Amsterdam, 1990.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Jones, A.J.I., Sergot, M. (1992). Formal specification of security requirements using the theory of normative positions. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013894
Download citation
DOI: https://doi.org/10.1007/BFb0013894
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive