In this paper, we combine formal modeling and analysis of infrastructures of organizations with sociological explanation to provide a framework for insider threat analysis. We use the higher order logic (HOL) proof assistant Isabelle/HOL to support this framework. In the formal model, we exhibit and use a common trick from the formal verification of security protocols, showing that it is applicable to insider threats. We introduce briefly a three-step process of social explanation, illustrating that it can be applied fruitfully to the characterization of insider threats. We introduce the insider theory constructed in Isabelle that implements this process of social explanation. To validate that the social explanation is generally useful for ...
In this paper we consider the limits of formal modeling of infrastructures and the application of so...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
The insider threat has long been considered one of the most serious threats in computer security, an...
In this paper we combine formal modeling and analysis of infrastructures of organisations with socio...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
Abstract—In this paper we revisit the advances made on invalidation policies to explore attack possi...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
Attacks on systems and organisations increasingly exploit human actors, for example through social e...
The insider threat faced by corporations and governments today is a real and significant problem, an...
In this paper we consider the limits of formal modeling of infrastructures and the application of so...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
The insider threat has long been considered one of the most serious threats in computer security, an...
In this paper we combine formal modeling and analysis of infrastructures of organisations with socio...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
In this paper, we approach the problem of modeling the human component in technical systems with a v...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The insider threat faced by corporations and governments today is a real and significant problem, an...
The Isabelle Insider framework formalises the technique of social explanation for modeling and analy...
Avionics is one of the fields in which verification methods have been pioneered and brought a new le...
Abstract—In this paper we revisit the advances made on invalidation policies to explore attack possi...
In this paper we revisit the advances made on invalidation policies to explore attack possibilities ...
Attacks on systems and organisations increasingly exploit human actors, for example through social e...
The insider threat faced by corporations and governments today is a real and significant problem, an...
In this paper we consider the limits of formal modeling of infrastructures and the application of so...
Recent surveys indicate that the financial impact and operating losses due to insider intrusions are...
The insider threat has long been considered one of the most serious threats in computer security, an...