1. Security policy compliance with violation management
- Author
-
Nora Cuppens, Jean-Paul Bodeveix, Julien Brunel, Thierry Sans, and Frédéric Cuppens
- Subjects
Security engineering ,Security service ,Computer science ,Security through obscurity ,Security convergence ,Network security policy ,Computer security model ,Computer security ,computer.software_genre ,Security policy ,Security testing ,computer - Abstract
A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the information system enforces its associated security policy if and only if actions executed in this system are permitted by the policy (if the policy is closed) or not prohibited (if the policy is open) and every obligatory actions are actually executed in the system (no violation of obligations). In this paper, we investigate a more sophisticated approach in which an information system specification is compliant with its security policy even though some security requirements may be violated. Our proposal is to consider that this is acceptable when the security policy specifies additional requirements that apply in case of violation of other security requirements. In this case, we formally define conditions to be satisfied by an information system to comply with its security policy. We then present a proof-based approach to check if these conditions are enforced.
- Published
- 2007