Abstract | ||
---|---|---|
Designing a security policy for an information system IS is a non-trivial task. Variants of the RBAC model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. The authors suggest translating both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. The authors describe how various kinds of constraints can be expressed and animated in this context. The authors also present a tool support which performs this translation and report on a case study where animation and testing techniques were used to validate the security policy of a medical emergency information system. |
Year | DOI | Venue |
---|---|---|
2015 | 10.4018/ijismd.2015010102 | International Journal of Information System Modeling and Design |
Keywords | Field | DocType |
Formal models, Information Systems, Security, Security Policy, Validation | Security testing,Software engineering,Systems engineering,Computer science,Software security assurance,Security engineering,Information security standards,Role-based access control,Security information and event management,Security policy,Computer security model | Journal |
Volume | Issue | ISSN |
6 | 1 | 1947-8186 |
Citations | PageRank | References |
5 | 0.46 | 34 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yves Ledru | 1 | 32 | 6.53 |
Akram Idani | 2 | 110 | 15.56 |
Jérémy Milhau | 3 | 5 | 0.46 |
Nafees Qamar | 4 | 52 | 7.57 |
Régine Laleau | 5 | 334 | 42.00 |
Jean-Luc Richier | 6 | 359 | 45.60 |
Mohamed-Amine Labiadh | 7 | 30 | 2.49 |