By Topic

Model Checking Based Security Policy Verification and Validation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Jianli Ma ; State Key Lab. of Networking & Switching Technol., Beijing Univ. of Posts & Telecommun., Beijing, China ; Dongfang Zhang ; Guoai Xu ; Yixian Yang

Lots of security mechanisms have been applied in current information systems to assure the confidentiality and integrality for the information processed. These mechanisms are selected in accordance with the certain security policies which should satisfy the system requirements. It is necessary to validate the security whether it really and truly protect the system. In this paper, we first define and formalize the validity and reliability for validation and verification criteria for the security validating. Then, we propose a model checking based method to validate the consistency and completeness for security policies. In our method, the system's behaviors are modeled as the transfer structure and the property is described using LTL formula, and the model checker SPIN is applied to verify and validate the security policy. The model checking based validation also can be used to generate the validate sequences. In the end, we approve the method proposed is valid and reliable for information system security validation.

Published in:

Intelligent Systems and Applications (ISA), 2010 2nd International Workshop on

Date of Conference:

22-23 May 2010