Obligations to enforce prohibitions: On the adequacy of security policies

W Pieters, J Padget, F Dechesne, V Dignum, H Aldewereld

Research output: Chapter or section in a book/report/conference proceedingChapter in a published conference proceeding

4 Citations (SciVal)
263 Downloads (Pure)

Abstract

Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too strong or too weak, leading to unnecessary productivity loss, or the possibility of becoming victim to attacks that exploit the weaknesses, respectively. In this paper, we propose a framework in which the security obligations of employees are linked directly to prohibitions that prevent external agents (attackers) from reaching their goals. We use graph-based and logic-based approaches to formalise and reason about such policies, and show how the framework can be used to verify correctness of the associated refinements. The framework can assist organisations in aligning security policies with their threat model.
Original languageEnglish
Title of host publicationSIN '13 Proceedings of the 6th International Conference on Security of Information and Networks
Place of PublicationNew York, NY, USA
PublisherAssociation for Computing Machinery
Pages54-61
Number of pages8
ISBN (Print)978-1-4503-2498-4
DOIs
Publication statusPublished - 26 Nov 2013
Event6th International Conference on Security of Information and Networks (SIN 2013) - Aksaray, Turkey
Duration: 26 Nov 201328 Nov 2013

Conference

Conference6th International Conference on Security of Information and Networks (SIN 2013)
Country/TerritoryTurkey
CityAksaray
Period26/11/1328/11/13

Keywords

  • graphs
  • logics
  • obligations
  • prohibitions
  • refinement
  • security policies

Fingerprint

Dive into the research topics of 'Obligations to enforce prohibitions: On the adequacy of security policies'. Together they form a unique fingerprint.

Cite this