Analysis and run-time verification of dynamic security policies

  • Authors:
  • Helge Janicke;François Siewe;Kevin Jones;Antonio Cau;Hussein Zedan

  • Affiliations:
  • Software Technology Research Laboratory, Gateway House, De Montfort University, Leicester;Software Technology Research Laboratory, Gateway House, De Montfort University, Leicester;Software Technology Research Laboratory, Gateway House, De Montfort University, Leicester;Software Technology Research Laboratory, Gateway House, De Montfort University, Leicester;Software Technology Research Laboratory, Gateway House, De Montfort University, Leicester

  • Venue:
  • DAMAS'05 Proceedings of the 2005 international conference on Defence Applications of Multi-Agent Systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Ensuring the confidentiality, integrity and availability of information is the key issue in the battle for information superiority and thus is a decisive factor in modern warfare. Security policies and security mechanisms govern the access to information and other resources. Their correct specification, i.e. denial of potentially dangerous access and adherence to all established need-to-know requirements, is critical. In this paper we present a security model that allows to express dynamic access control policies that can change on time or events. A simple agent system, simulating a platoon, is used to show the need and the advantages of our policy model. The paper finally presents how existing tool-support can be used for the analysis and verification of policies.