ACM Transactions on Information and System Security (TISSEC)
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Physical Mobility and Logical Mobility in Ubiquitous Computing Environments
MA '02 Proceedings of the 6th International Conference on Mobile Agents
Model-carrying code: a practical approach for safe execution of untrusted applications
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
Spatial security policies for mobile agents in a sentient computing environment
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Specifying and verifying organizational security properties in first-order logic
Verification, induction termination analysis
Specifying and verifying organizational security properties in first-order logic
Verification, induction termination analysis
Hi-index | 0.00 |
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. At present our models are ad-hoc. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a security principle. The model checking activity shows examples of policies that are too weak to cope with mobility.