Reference Hub2
Ell Secure Information System Using Modal Logic Technique

Ell Secure Information System Using Modal Logic Technique

Copyright: © 2011 |Volume: 2 |Issue: 2 |Pages: 12
ISSN: 1947-3036|EISSN: 1947-3044|EISBN13: 9781613508961|DOI: 10.4018/jsse.2011040104
Cite Article Cite Article

MLA

Bai, Yun, and Khaled M. Khan. "Ell Secure Information System Using Modal Logic Technique." IJSSE vol.2, no.2 2011: pp.65-76. http://doi.org/10.4018/jsse.2011040104

APA

Bai, Y. & Khan, K. M. (2011). Ell Secure Information System Using Modal Logic Technique. International Journal of Secure Software Engineering (IJSSE), 2(2), 65-76. http://doi.org/10.4018/jsse.2011040104

Chicago

Bai, Yun, and Khaled M. Khan. "Ell Secure Information System Using Modal Logic Technique," International Journal of Secure Software Engineering (IJSSE) 2, no.2: 65-76. http://doi.org/10.4018/jsse.2011040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In this paper, the authors propose a formal logic technique to protect information systems. As the widespread use of computer systems grows, the security of the information stored in such systems has become more important. As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the system security agent. Authorization specification has been widely studied and a variety of approaches have been investigated. The authors propose a formal language with modal logic to specify the system security policies. The authors also provide the reasoning in response to system access requests, especially in situations where the security agent’s knowledge base is incomplete. The semantics of this language is provided by translating it into epistemic logic program in which knowledge related modal operators are employed to represent agents’ knowledge in reasoning. The authors demonstrate how this approach handles the situation where the security agent’s knowledge on access decision is incomplete. The proposed mechanism effectively prevents unauthorized and malicious access to information systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.