...
首页> 外文期刊>International journal of information system modeling and design >Validation of IS Security Policies Featuring Authorisation Constraints
【24h】

Validation of IS Security Policies Featuring Authorisation Constraints

机译:验证具有授权约束的IS安全策略

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Designing a security policy for an information system (IS) is a non-trivial task. Variants of the RBA C model can be used to express such policies as access-control rules associated to constraints. In this paper, we advocate that currently available tools do not take sufficiently into account the functional description of the application and its impact on authorisation constraints and dynamic aspects of security. The authors suggest translating both security and functional models into a formal language, such as B, whose analysis and animation tools will help validate a larger set of security scenarios. The authors describe how various kinds of constraints can be expressed and animated in this context. The authors also present a tool support which performs this translation and report on a case study where animation and testing techniques were used to validate the security policy of a medical emergency information system.
机译:为信息系统(IS)设计安全策略是一项艰巨的任务。可以使用RBA C模型的变体来表达诸如与约束关联的访问控制规则之类的策略。在本文中,我们主张当前可用的工具没有充分考虑应用程序的功能描述及其对授权约束和安全性动态方面的影响。作者建议将安全性和功能性模型均转换为正式语言,例如B,其分析和动画工具将有助于验证更大的安全性场景集。作者描述了在这种情况下如何表达和表达各种约束。作者还提供了一个工具支持,可以执行此翻译并报告一个案例研究,其中使用了动画和测试技术来验证医疗紧急信息系统的安全策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号