Modelling mobility aspects of security policies

  • Authors:
  • Pieter Hartel;Pascal van Eck;Sandro Etalle;Roel Wieringa

  • Affiliations:
  • Department of Computer Science, University of Twente, Enschede, The Netherlands;Department of Computer Science, University of Twente, Enschede, The Netherlands;Department of Computer Science, University of Twente, Enschede, The Netherlands;Department of Computer Science, University of Twente, Enschede, The Netherlands

  • Venue:
  • CASSIS'04 Proceedings of the 2004 international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility.