loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Sebastiano Battiato 1 ; Giampaolo Bella 2 and Salvatore Riccobene 3

Affiliations: 1 Università di Catania, Italy ; 2 Università Di Catania, Italy ; 3 Università di Catania, Italy

Keyword(s): security policy, verification, theorem proving, formal methods

Related Ontology Subjects/Areas/Topics: Data and Application Security and Privacy ; Data Engineering ; Data Privacy and Security ; Databases and Data Security ; Information and Systems Security

Abstract: Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the system is implemented, its formal verification consists in checking whether it conforms to the norms that its policy stated. Hence, security policies significantly influence the final assessment of real systems. Experience shows that important policies suffering inconsistencies have reached the final stage of implementation in a real system. Here comes the need for formal analysis at the abstract level of policies. It is advocated that known inductive techniques and a general-purpose proof assistant can be used profitably for the proof of correctness of security policies.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.16.75.156

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Battiato, S.; Bella, G. and Riccobene, S. (2004). Should We Prove Security Policies Correct?. In Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security (ICETE 2004) - EGCDMAS; ISBN 972-8865-17-1, SciTePress, pages 56-65. DOI: 10.5220/0001389600560065

@conference{egcdmas04,
author={Sebastiano Battiato. and Giampaolo Bella. and Salvatore Riccobene.},
title={Should We Prove Security Policies Correct?},
booktitle={Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security (ICETE 2004) - EGCDMAS},
year={2004},
pages={56-65},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001389600560065},
isbn={972-8865-17-1},
}

TY - CONF

JO - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security (ICETE 2004) - EGCDMAS
TI - Should We Prove Security Policies Correct?
SN - 972-8865-17-1
AU - Battiato, S.
AU - Bella, G.
AU - Riccobene, S.
PY - 2004
SP - 56
EP - 65
DO - 10.5220/0001389600560065
PB - SciTePress