Abstract
Ensuring the confidentiality, integrity and availability of information is the key issue in the battle for information superiority and thus is a decisive factor in modern warfare. Security policies and security mechanisms govern the access to information and other resources. Their correct specification, i.e. denial of potentially dangerous access and adherence to all established need-to-know requirements, is critical. In this paper we present a security model that allows to express dynamic access control policies that can change on time or events. A simple agent system, simulating a platoon, is used to show the need and the advantages of our policy model. The paper finally presents how existing tool-support can be used for the analysis and verification of policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Thomas, E., Potok, A.S.L., Phillips, L., Pollock, R.: Suitability of agent technology or military command and control in the future combat system environment. In: Proceeding 8th ICCRTS, National Defence University (2003)
Sheldon, F., Potok, T., Kavi, K.: Multi-agent system case studies in command and control, information fusion and data management. Journal of Informatica 28, 78–89 (2004)
Bharadwajgc, R.: Secure middleware for situation-aware naval c2 and combat systems. In: Proceedings 9th International Workshop on Future Trends of Distributed Comput ing Systems, FTDCS 2003 (2003)
Alberts, D.S.: Understanding information age warfare. CCRP publication series. DoD, US (2001)
Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. ACM Transaction on Database Systems 26, 214–260 (2001)
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems 15, 1–29 (1993)
Barker, S., Stuckey, P.J.: Flexible access control specification with constraint logic programming. ACM Transactions on Information & System Security 6 (2003)
Bertino, E., Bonatti, P.A., Ferrari, E.: Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 191–233 (2001)
Cau, A., Czarnecki, C., Zedan, H.: Designing a provably correct robot control system using a ‘Lean’ formal method. In: Ravn, A.P., Rischel, H. (eds.) FTRTFT 1998. LNCS, vol. 1486, pp. 123–132. Springer, Heidelberg (1998)
Siewe, F., Cau, A., Zedan, H.: A compositional framework for access control policies enforcement. In: Proceedings of the ACM workshop on Formal Methods in Security Engineering: From Specifications to Code (2003)
Eckert, C.: Matching security to application needs. In: IFIP TC11 11th International Conference on Information Security, pp. 237–254 (1995)
Moszkowski, B.: Some very compositional temporal properties. In: Olderog, E.R. (ed.) Programming Concepts, Methods and Calculi. IFIP Transactions, vol. A-56, pp. 307–326. IFIP, Elsevier Science B.V., North-Holland (1994)
Zedan, H., Cau, A., Zhou, S.: A calculus for evolution. In: Proc. of The Fifth International Conference on Computer Science and Informatics, CS&I 2000 (2000)
Woo, T.Y.C., Lam, S.S.: Authorization in distributed systems: A formal approach. In: Proceedings of the 13th IEEE Symposium on Research in security and Privacy, Oakland, California, May 4-6, pp. 33–50 (1992)
Brewer, D., Nash, M.: The Chinese Wall Policy. In: IEEE Symposium on Research in Security and Privacy, pp. 206–214 (1989)
Moszkowski, B.: Executing Temporal Logic Programs. Cambridge University Press, England (1986)
Cau, A., Moszkowski, B., Zedan, H.: The ITL homepage (2005), http://www.cse.dmu.ac.uk/~cau/itlhomepage/index.html
Fisher, M.: A survey of concurrent METATEM – the language and its applications. In: Gabbay, D.M., Ohlbach, H.J. (eds.) ICTL 1994. LNCS (LNAI), vol. 827, pp. 480–505. Springer, Heidelberg (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Janicke, H., Siewe, F., Jones, K., Cau, A., Zedan, H. (2006). Analysis and Run-Time Verification of Dynamic Security Policies. In: Thompson, S.G., Ghanea-Hercock, R. (eds) Defence Applications of Multi-Agent Systems. DAMAS 2005. Lecture Notes in Computer Science(), vol 3890. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11683704_8
Download citation
DOI: https://doi.org/10.1007/11683704_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-32832-2
Online ISBN: 978-3-540-32835-3
eBook Packages: Computer ScienceComputer Science (R0)