Title
Validation of IS Security Policies Featuring Authorisation Constraints
Abstract
Designing a security policy for an information system IS is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. The authors suggest translating both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. The authors describe how various kinds of constraints can be expressed and animated in this context. The authors also present a tool support which performs this translation and report on a case study where animation and testing techniques were used to validate the security policy of a medical emergency information system.
Year
DOI
Venue
2015
10.4018/ijismd.2015010102
International Journal of Information System Modeling and Design
Keywords
Field
DocType
Formal models, Information Systems, Security, Security Policy, Validation
Security testing,Software engineering,Systems engineering,Computer science,Software security assurance,Security engineering,Information security standards,Role-based access control,Security information and event management,Security policy,Computer security model
Journal
Volume
Issue
ISSN
6
1
1947-8186
Citations 
PageRank 
References 
5
0.46
34
Authors
7
Name
Order
Citations
PageRank
Yves Ledru1326.53
Akram Idani211015.56
Jérémy Milhau350.46
Nafees Qamar4527.57
Régine Laleau533442.00
Jean-Luc Richier635945.60
Mohamed-Amine Labiadh7302.49