Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Combining Logics for Modelling Security Policies

Liu, C., McLean, P. and Ozols, M.A.

    This paper considers a logical framework for modelling security policies for information systems. Epistemic, deontic and temporal logics can respectively be used to express what an agent knows or believes, what an agent is permitted or forbidden to know or do, and the dynamic progress of a system over time. In modelling a security policy for a practical system, one may need to combine these logical notions to express statements of the policy, so a combination of logics is considered. We investigate the issues regarding techniques for combining logic, approaches to formalizing security policies based on a combined logic, and strategies applied for reasoning about the security properties required to be satisfied by a policy. Several possible future research directions under this logical framework are discussed.
Cite as: Liu, C., McLean, P. and Ozols, M.A. (2005). Combining Logics for Modelling Security Policies. In Proc. Twenty-Eighth Australasian Computer Science Conference (ACSC2005), Newcastle, Australia. CRPIT, 38. Estivill-Castro, V., Ed. ACS. 323-332.
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS
 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 16 Nov 2007