Assuring consistency in mixed models

Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users...

Full description

Saved in:
Bibliographic Details
Main Author: Haraty, Ramzi A. (author)
Other Authors: Naous, Mirna F. (author), Mourad, Azzam (author)
Format: article
Published: 2014
Online Access:http://hdl.handle.net/10725/2674
http://dx.doi.org/10.1016/j.jocs.2014.02.009
http://www.sciencedirect.com/science/article/pii/S1877750314000325
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1864513459052347392
author Haraty, Ramzi A.
author2 Naous, Mirna F.
Mourad, Azzam
author2_role author
author
author_facet Haraty, Ramzi A.
Naous, Mirna F.
Mourad, Azzam
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
Naous, Mirna F.
Mourad, Azzam
dc.date.none.fl_str_mv 2014
2015-11-24T12:25:10Z
2015-11-24T12:25:10Z
2015-11-24
dc.identifier.none.fl_str_mv 1877-7503
http://hdl.handle.net/10725/2674
http://dx.doi.org/10.1016/j.jocs.2014.02.009
Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663.
http://www.sciencedirect.com/science/article/pii/S1877750314000325
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv Journal of Computational Science
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv Assuring consistency in mixed models
dc.type.none.fl_str_mv Article
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description Information systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users may find it necessary to combine policies in order to protect their information in a suitable way. However, inconsistencies may arise as a result of implementing multiple secrecy and privacy models; and therefore, render these services unsecure. In this paper, we propose an approach to detect and report inconsistencies when choosing mixed models for integrity and security. It is based on specifying the policies in first order logic and applying formal analysis. We demonstrate the feasibility of our proposition by applying it to the Clark Wilson and role based access control models. We use the Alloy language and analyzer to formalize the mixed model and check for any inconsistencies.
eu_rights_str_mv openAccess
format article
id LAURepo_e977dc1c3d963e83279ea52c2fa8b6bc
identifier_str_mv 1877-7503
Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/2674
publishDate 2014
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling Assuring consistency in mixed modelsHaraty, Ramzi A.Naous, Mirna F.Mourad, AzzamInformation systems security defines three properties of information: confidentiality, integrity, and availability. These characteristics remain major concerns throughout the commercial and military industry. Ordinary users have taken these features as basis for their businesses. Furthermore, users may find it necessary to combine policies in order to protect their information in a suitable way. However, inconsistencies may arise as a result of implementing multiple secrecy and privacy models; and therefore, render these services unsecure. In this paper, we propose an approach to detect and report inconsistencies when choosing mixed models for integrity and security. It is based on specifying the policies in first order logic and applying formal analysis. We demonstrate the feasibility of our proposition by applying it to the Clark Wilson and role based access control models. We use the Alloy language and analyzer to formalize the mixed model and check for any inconsistencies.PublishedN/A2015-11-24T12:25:10Z2015-11-24T12:25:10Z20142015-11-24Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1877-7503http://hdl.handle.net/10725/2674http://dx.doi.org/10.1016/j.jocs.2014.02.009Haraty, R. A., Naous, M. F., & Mourad, A. (2014). Assuring consistency in mixed models. Journal of Computational Science, 5(4), 653-663.http://www.sciencedirect.com/science/article/pii/S1877750314000325enJournal of Computational Scienceinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/26742020-05-13T19:53:11Z
spellingShingle Assuring consistency in mixed models
Haraty, Ramzi A.
status_str publishedVersion
title Assuring consistency in mixed models
title_full Assuring consistency in mixed models
title_fullStr Assuring consistency in mixed models
title_full_unstemmed Assuring consistency in mixed models
title_short Assuring consistency in mixed models
title_sort Assuring consistency in mixed models
url http://hdl.handle.net/10725/2674
http://dx.doi.org/10.1016/j.jocs.2014.02.009
http://www.sciencedirect.com/science/article/pii/S1877750314000325