Security policy compliance with violation management

  • Authors:
  • Julien Brunel;Frédéric Cuppens;Nora Cuppens;Thierry Sans;Jean-Paul Bodeveix

  • Affiliations:
  • Institut de Recherche en Informatique de Toulouse, Toulouse, France;Ecole Nationale Supérieure des Télécommunications de Bretagne, Rennes, France;Ecole Nationale Supérieure des Télécommunications de Bretagne, Rennes, France;Ecole Nationale Supérieure des Télécommunications de Bretagne, Rennes, France;Institut de Recherche en Informatique de Toulouse, Toulouse, France

  • Venue:
  • Proceedings of the 2007 ACM workshop on Formal methods in security engineering
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the information system enforces its associated security policy if and only if actions executed in this system are permitted by the policy (if the policy is closed) or not prohibited (if the policy is open) and every obligatory actions are actually executed in the system (no violation of obligations). In this paper, we investigate a more sophisticated approach in which an information system specification is compliant with its security policy even though some security requirements may be violated. Our proposal is to consider that this is acceptable when the security policy specifies additional requirements that apply in case of violation of other security requirements. In this case, we formally define conditions to be satisfied by an information system to comply with its security policy. We then present a proof-based approach to check if these conditions are enforced.