A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language that will allow us to represent the structure of information and to employ reasoning for consistency checking. We motivate our choice of language by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities. We explain our approach in the context of security requirements for medical systems. We evaluate our work theoretically, by means of an example of a real world policy rule.
International audienceSecurity is top priority for pervasive applications, for which the number of r...
Abstract—Graph-based assessment formalisms have proven to be useful in the safety, dependability, an...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
International audienceThis paper presents an approach allowing for a given security and utility requ...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
Abstract — Verified and validated security policies are essential components of high assurance compu...
This paper analyses the problem of specifying a security policy for organizations. First, various is...
Security policies in organisations typically take the form of obligations for the employees. However...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Policies are used to control the behavior of complex systems. In order to support reasoning about t...
A common requirement in policy specification languages is the ability to map policies to the underly...
Abstract Security policies are ubiquitous in information systems and more generally in the managemen...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
Abstract—Graph-based assessment formalisms have proven to be useful in the safety, dependability, an...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...
A method must be provided to support the analysis of security policy rules interdependencies in a (p...
With the ever increasing importance of computer networks such as the Internet,and the today almost u...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
International audienceThis paper presents an approach allowing for a given security and utility requ...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
Abstract — Verified and validated security policies are essential components of high assurance compu...
This paper analyses the problem of specifying a security policy for organizations. First, various is...
Security policies in organisations typically take the form of obligations for the employees. However...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Policies are used to control the behavior of complex systems. In order to support reasoning about t...
A common requirement in policy specification languages is the ability to map policies to the underly...
Abstract Security policies are ubiquitous in information systems and more generally in the managemen...
International audienceSecurity is top priority for pervasive applications, for which the number of r...
Abstract—Graph-based assessment formalisms have proven to be useful in the safety, dependability, an...
International audienceThis paper presents a comparative study of policy specification lan- guages. O...