loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Preetam Mukherjee and Chandan Mazumdar

Affiliation: Jadavpur University, India

Keyword(s): Security Requirements, Security Policies, Security Violations, Process Algebra.

Abstract: The responsibility of controlling, monitoring, analyzing or enforcing security of a system becomes complex due to the interplay among different security policies and requirements. Many of the security requirements have overlap among themselves and they are not exhaustive in nature. For that reason, maintaining security requirements and designing optimal security controls are difficult, and involve wastage of valuable resources. Finding out a set of mutually exclusive and exhaustive security requirements and canonical policies will indeed ease the security management job. From this motivation, in this paper we try to find out a set of mutually exclusive and exhaustive security requirements. To do this, a small set of low-level security policy descriptions are proposed using Process Algebraic notions, by which all kinds of high level security policies can be represented. Non-compliance to this new set of security policies gives rise to a set of security violations. These security viola tions are mutually exclusive and exhaustive, so all the other security violations can be described by this basic set of security violations. From these security violations, a set of security requirements is determined. To preserve the security for any system it is necessary and sufficient to maintain these requirements. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.236.86.184

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mukherjee, P. and Mazumdar, C. (2015). A Novel Model of Security Policies and Requirements. In Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-081-9; ISSN 2184-4356, SciTePress, pages 73-82. DOI: 10.5220/0005239400730082

@conference{icissp15,
author={Preetam Mukherjee. and Chandan Mazumdar.},
title={A Novel Model of Security Policies and Requirements},
booktitle={Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP},
year={2015},
pages={73-82},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005239400730082},
isbn={978-989-758-081-9},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 1st International Conference on Information Systems Security and Privacy - ICISSP
TI - A Novel Model of Security Policies and Requirements
SN - 978-989-758-081-9
IS - 2184-4356
AU - Mukherjee, P.
AU - Mazumdar, C.
PY - 2015
SP - 73
EP - 82
DO - 10.5220/0005239400730082
PB - SciTePress