Security Policy Compliance with Violation Management

被引:0
|
作者
Brunel, Julien [1 ]
Cuppens, Frederic
Cuppens-Boulahia, Nora
Sans, Thierry
Bodeveix, Jean-Paul [1 ]
机构
[1] Univ Toulouse 3, Inst Rech Informat Toulouse, F-31062 Toulouse, France
关键词
deontic logic; labeled kripke structure; security policy; temporal logic; violation;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the information system enforces its associated security policy if and only if actions executed in this system are permitted by the policy (if the policy is closed) or not prohibited (if the policy is open) and every obligatory actions are actually executed in the system (no violation of obligations). In this paper, we investigate a more sophisticated approach in which an information system specification is compliant with its security policy even though some security requirements may be violated. Our proposal is to consider that this is acceptable when the security policy specifies additional requirements that apply in case of violation of other security requirements. In this case, we formally define conditions to be, satisfied by an information system to comply with its security policy. We then present a proof-based approach to check if these conditions are enforced.
引用
收藏
页码:31 / 40
页数:10
相关论文
共 50 条
  • [41] An Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia
    Arage, Tilahun Muluneh
    Tesema, Tibebe Beshah
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 228 - 232
  • [42] Understanding Information Security Policy Violation from a Situational Action Perspective
    Li, Han
    Luo, Xin
    Chen, Yan
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772
  • [43] Policy, Legal, Legislation and Compliance Saudi Personnel Compliance and Adaption to Recent Security Measures
    Alsaleem, Lamyaa Sami
    Aldakheel, Malak Fahad
    Alotaibi, Deema Abdullah
    Alqahtani, Sarah Ali
    Alharbi, Sara Fawaz
    Nagy, Naya
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [44] Social control through deterrence on the compliance with information security policy
    Choi, Myeonggil
    Song, Jeongseok
    SOFT COMPUTING, 2018, 22 (20) : 6765 - 6772
  • [45] Information security policy compliance: a higher education case study
    Alshare, Khaled A.
    Lane, Peggy L.
    Lane, Michael R.
    INFORMATION AND COMPUTER SECURITY, 2018, 26 (01) : 91 - 108
  • [46] Security Engine Management of Router based on Security Policy
    Jo, Su Hyung
    Kim, Ki Young
    Lee, Sang Ho
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 116 - 119
  • [47] Designing an incentive mechanism for information security policy compliance: An experiment
    Li, Yuanxiang John
    Hoffman, Elizabeth
    JOURNAL OF ECONOMIC BEHAVIOR & ORGANIZATION, 2023, 212 : 138 - 159
  • [48] Employees' information security policy compliance: A norm activation perspective
    Yazdanmehr, Adel
    Wang, Jingguo
    DECISION SUPPORT SYSTEMS, 2016, 92 : 36 - 46
  • [49] Information Security Policy Compliance: An Empirical Study of Ethical Ideology
    Al-Omari, Ahmad
    Deokar, Amit
    El-Gayar, Omar
    Walters, Jack
    Aleassa, Hasan
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027
  • [50] Can financial incentives help with the struggle for security policy compliance?
    Goel, Sanjay
    Williams, Kevin J.
    Huang, Jingyi
    Warkentin, Merrill
    INFORMATION & MANAGEMENT, 2021, 58 (04)