Abstract
Security policies in organisations typically take the form of obligations for the employees. However, it is often unclear what the purpose of such obligations is, and how these can be integrated in the operational processes of the organisation. This can result in policies that may be either too strong or too weak, leading to unnecessary productivity loss, or the possibility of becoming victim to attacks that exploit the weaknesses, respectively. In this paper, we propose a framework in which the security obligations of employees are linked directly to prohibitions that prevent external agents (attackers) from reaching their goals. We use graph-based and logic-based approaches to formalise and reason about such policies, and show how the framework can be used to verify correctness of the associated refinements. The framework can assist organisations in aligning security policies with their threat model.
Original language | English |
---|---|
Title of host publication | SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks |
Place of Publication | New York, NY, USA |
Publisher | Association for Computing Machinery |
Pages | 54-61 |
Number of pages | 8 |
ISBN (Print) | 978-1-4503-2498-4 |
DOIs | |
Publication status | Published - 26 Nov 2013 |
Event | 6th International Conference on Security of Information and Networks (SIN 2013) - Aksaray, Turkey Duration: 26 Nov 2013 → 28 Nov 2013 |
Conference
Conference | 6th International Conference on Security of Information and Networks (SIN 2013) |
---|---|
Country/Territory | Turkey |
City | Aksaray |
Period | 26/11/13 → 28/11/13 |
Keywords
- graphs
- logics
- obligations
- prohibitions
- refinement
- security policies