Sciweavers

Share
SACMAT
2010
ACM

Monitoring security policies with metric first-order temporal logic

11 years 3 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how a wide variety of security policies can be naturally formalized in this expressive logic, ranging from traditional policies like Chinese Wall and separation of duty to more specialized usage-control and compliance requirements. We also explain how these formalizations can be directly used for monitoring and experimentally evaluate the performance of the resulting monitors. Categories and Subject Descriptors D.2.1 [Software Engineering]: Requirements/Specifications—Languages; D.2.5 [Software Engineering]: Testing and Debugging—Monitors, Tracing; D.4.6 [Operating Systems]: Security and Protection; J.1 [Computer Applications]: Administrative Data Processing—Business, Law General Terms Security, Verification, Legal Aspects Keywords Temporal Logic, Monitoring, Security Policies, Access Control, Separation ...
David A. Basin, Felix Klaedtke, Samuel Müller
Added 18 Jul 2010
Updated 18 Jul 2010
Type Conference
Year 2010
Where SACMAT
Authors David A. Basin, Felix Klaedtke, Samuel Müller
Comments (0)
books