skip to main content
10.1145/508791.508842acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Interactive simulation of security policies

Published:11 March 2002Publication History

ABSTRACT

A general framework for simulating security policies interactively is developed by ASMs (Gurevich's Abstract State Machines) and then mechanised by the ASM Workbench. The ASM external functions make it possible to simulate under the environmental influence the behaviour of a policy. The interactive features of the Workbench allow the simulation of the policy norms that apply to a given case study, facilitating their understanding. Possible inconsistencies affecting the case study can be automatically detected during the simulation and widely documented. The framework is demonstrated on a published, example security policy. The findings support the claim that adding priorities to roles achieves the crucial goal of consistency.

References

  1. M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. C. Bidan and V. Issarny. Dealing with multi-policy security in large open distributed systems. In Proc. of the 5th European Symposium on Research in Computer Security, LNCS 1485, pages 51-66. Springer, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Borger and L. Mearelli. Integrating ASMs into the software development life cycle. Journal of Universal Computer Science, 3(5):603-665, 1997.]]Google ScholarGoogle Scholar
  4. L. Catach. TABLEAUX: A general theorem prover for modal logics. Journal of Automated Reasoning, 7(4):489-510, 1991.]]Google ScholarGoogle ScholarCross RefCross Ref
  5. L. Cholvy and F. Cuppens. Analyzing consistency of security policies. In Proc. of the 16th IEEE Symposium on Security and Privacy. IEEE Press, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Cuppens and C. Saurel. Specifying a security policy: A case study. In Proc. of the 9th IEEE Computer Security Foundations Workshop. IEEE Press, 1996.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Del Castillo. Towards comprehensive tool support for Abstract State Machines: the ASM Workbench tool environment and architecture. In Proc. of International Workshop on Current Trends in Applied Formal Methods, LNCS 1641, pages 311-325. Springer, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Del Castillo and K. Winter. Model checking support for the ASM high-level language. In Proc of the 6th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, LNCS 1785, pages 331-346. Springer, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Gargantini and E. Riccobene. Encoding abstract state machines in pvs. In Proc. of the International Workshop on Abstract State Machines (ASM'00), LNCS 1912, pages 152-173. Springer, 2000.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Gurevich. Evolving algebras 1993: Lipari Guide. In E. Börger, editor, Specification and Validation Methods, pages 9-37. Oxford University Press, 1994.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. Ortalo. A flexible method for information system security policy specification. In Proc. of the 5th European Symposium on Research in Computer Security, LNCS 1485, pages 67-84. Springer, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. A. Kripke. Semantical considerations on modal logic. Acta Philosophica Fennica, 16:83-94, 1963.]]Google ScholarGoogle Scholar

Index Terms

  1. Interactive simulation of security policies

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SAC '02: Proceedings of the 2002 ACM symposium on Applied computing
          March 2002
          1200 pages
          ISBN:1581134452
          DOI:10.1145/508791

          Copyright © 2002 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 March 2002

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,650of6,669submissions,25%
        • Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader