Assuring consistency in mixed models
Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , |
| Format: | article |
| Published: |
2014
|
| Online Access: | http://hdl.handle.net/10725/2674 http://dx.doi.org/10.1016/j.jocs.2014.02.009 http://www.sciencedirect.com/science/article/pii/S1877750314000325 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1864513459052347392 |
|---|---|
| author | Haraty, Ramzi A. |
| author2 | Naous, Mirna F. Mourad, Azzam |
| author2_role | author author |
| author_facet | Haraty, Ramzi A. Naous, Mirna F. Mourad, Azzam |
| author_role | author |
| dc.creator.none.fl_str_mv | Haraty, Ramzi A. Naous, Mirna F. Mourad, Azzam |
| dc.date.none.fl_str_mv | 2014 2015-11-24T12:25:10Z 2015-11-24T12:25:10Z 2015-11-24 |
| dc.identifier.none.fl_str_mv | 1877-7503 http://hdl.handle.net/10725/2674 http://dx.doi.org/10.1016/j.jocs.2014.02.009 Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663. http://www.sciencedirect.com/science/article/pii/S1877750314000325 |
| dc.language.none.fl_str_mv | en |
| dc.relation.none.fl_str_mv | Journal of Computational Science |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | Assuring consistency in mixed models |
| dc.type.none.fl_str_mv | Article info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users may find it necessary to combine policies in order to protect their information in a suitable way. However, inconsistencies may arise as a result of implementing multiple secrecy and privacy models; and therefore, render these services unsecure. In this paper, we propose an approach to detect and report inconsistencies when choosing mixed models for integrity and security. It is based on specifying the policies in first order logic and applying formal analysis. We demonstrate the feasibility of our proposition by applying it to the Clark Wilson and role based access control models. We use the Alloy language and analyzer to formalize the mixed model and check for any inconsistencies. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | LAURepo_e977dc1c3d963e83279ea52c2fa8b6bc |
| identifier_str_mv | 1877-7503 Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/2674 |
| publishDate | 2014 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | Assuring consistency in mixed modelsHaraty, Ramzi A.Naous, Mirna F.Mourad, AzzamInformation systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users may find it necessary to combine policies in order to protect their information in a suitable way. However, inconsistencies may arise as a result of implementing multiple secrecy and privacy models; and therefore, render these services unsecure. In this paper, we propose an approach to detect and report inconsistencies when choosing mixed models for integrity and security. It is based on specifying the policies in first order logic and applying formal analysis. We demonstrate the feasibility of our proposition by applying it to the Clark Wilson and role based access control models. We use the Alloy language and analyzer to formalize the mixed model and check for any inconsistencies.PublishedN/A2015-11-24T12:25:10Z2015-11-24T12:25:10Z20142015-11-24Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1877-7503http://hdl.handle.net/10725/2674http://dx.doi.org/10.1016/j.jocs.2014.02.009Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663.http://www.sciencedirect.com/science/article/pii/S1877750314000325enJournal of Computational Scienceinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/26742020-05-13T19:53:11Z |
| spellingShingle | Assuring consistency in mixed models Haraty, Ramzi A. |
| status_str | publishedVersion |
| title | Assuring consistency in mixed models |
| title_full | Assuring consistency in mixed models |
| title_fullStr | Assuring consistency in mixed models |
| title_full_unstemmed | Assuring consistency in mixed models |
| title_short | Assuring consistency in mixed models |
| title_sort | Assuring consistency in mixed models |
| url | http://hdl.handle.net/10725/2674 http://dx.doi.org/10.1016/j.jocs.2014.02.009 http://www.sciencedirect.com/science/article/pii/S1877750314000325 |