Security Policy Compliance with Violation Management

被引:0
|
作者
Brunel, Julien [1 ]
Cuppens, Frederic
Cuppens-Boulahia, Nora
Sans, Thierry
Bodeveix, Jean-Paul [1 ]
机构
[1] Univ Toulouse 3, Inst Rech Informat Toulouse, F-31062 Toulouse, France
关键词
deontic logic; labeled kripke structure; security policy; temporal logic; violation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the information system enforces its associated security policy if and only if actions executed in this system are permitted by the policy (if the policy is closed) or not prohibited (if the policy is open) and every obligatory actions are actually executed in the system (no violation of obligations). In this paper, we investigate a more sophisticated approach in which an information system specification is compliant with its security policy even though some security requirements may be violated. Our proposal is to consider that this is acceptable when the security policy specifies additional requirements that apply in case of violation of other security requirements. In this case, we formally define conditions to be, satisfied by an information system to comply with its security policy. We then present a proof-based approach to check if these conditions are enforced.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [21] An Integrative Behavioral Model of Information Security Policy Compliance
    Kim, Sang Hoon
    Yang, Kyung Hoon
    Park, Sunyoung
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [22] Information Security Policy Compliance: Systematic Literature Review
    Angraini
    Alias, Rose Alinda
    Okfalisa
    FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE, 2019, 161 : 1216 - 1224
  • [23] Dual Routes of Training on Information Security Policy Compliance
    Chen, Qiuyu
    Hong, Yuxiang
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024,
  • [24] The Theory of Planned Behavior and Information Security Policy Compliance
    Sommestad, Teodor
    Karlzen, Henrik
    Hallberg, Jonas
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (04) : 344 - 353
  • [25] The Effect of Patient Centeredness on Nurses' Security Policy Compliance
    Tazkarji, Mohamed Y.
    AMCIS 2020 PROCEEDINGS, 2020,
  • [26] Establishing information security policy compliance culture in organizations
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (04) : 420 - 436
  • [27] TOWARD A UNIFIED MODEL OF INFORMATION SECURITY POLICY COMPLIANCE
    Moody, Gregory D.
    Siponen, Mikko
    Pahnila, Seppo
    MIS QUARTERLY, 2018, 42 (01) : 285 - +
  • [28] Leader power and employees' information security policy compliance
    Kim, Hyungjin Lukas
    Choi, HanByeol Stella
    Han, Jinyoung
    SECURITY JOURNAL, 2019, 32 (04) : 391 - 409
  • [29] Factors influencing protection motivation and IS security policy compliance
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, Adam
    2006 INNOVATIONS IN INFORMATION TECHNOLOGY, 2006, : 166 - 170
  • [30] Employees' BYOD Security Policy Compliance in the Public Sector
    Palanisamy, Rathika
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2024, 64 (01) : 62 - 77