Validation of security policies by the animation of Z specifications

  • Authors:
  • Yves Ledru;Nafees Qamar;Akram Idani;Jean-Luc Richier;Mohamed-Amine Labiadh

  • Affiliations:
  • UJF-Grenoble 1/Grenoble-INP/UPMF-Grenoble2/CNRS, Grenoble, France;INRIA Rhône Alpes & UJF-Grenoble 1/Grenoble-INP/UPMF-Grenoble2/CNRS, Grenoble, France;UJF-Grenoble 1/Grenoble-INP/UPMF-Grenoble2/CNRS, Grenoble, France;UJF-Grenoble 1/Grenoble-INP/UPMF-Grenoble2/CNRS, Grenoble, France;UJF-Grenoble 1/Grenoble-INP/UPMF-Grenoble2/CNRS, Grenoble, France

  • Venue:
  • Proceedings of the 16th ACM symposium on Access control models and technologies
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Designing a security policy for an information system is a non-trivial task. In this paper, we consider the design of a security policy based on a variant of the RBAC model, close to SecureUML. This variant includes constraints for the separation of duty, as well as contextual constraints. Contextual constraints use information about the state of the functional model of the application to grant permissions to users. These constraints add flexibility to the security policy, but make its validation more difficult. In this paper, we first review two tools, USE and SecureMOVA, which can be used to analyse and validate a security policy. These tools focus on analyses of static aspects of the secured system. We then propose a new tool, based on the Z formal language, which uses animation of the specification to validate the static as well as dynamic aspects of the security policy, taking into account possible evolutions of the state of the functional model. We discuss how the security policy and the functional application are described to the tool, and what kind of queries and animations can be performed to analyse nominal and malicious behaviours of the system.