loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Anja Fischer and Winfried Kühnhauser

Affiliation: Ilmenau University of Technology, Germany

Keyword(s): Security engineering, Security policies, Security models, Access control, HRU safety, Model decomposition, Enterprise resource planning security.

Related Ontology Subjects/Areas/Topics: Access Control ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Models ; Paradigm Trends ; Security Engineering ; Security in Information Systems ; Security Verification and Validation ; Software Engineering ; Web Information Systems and Technologies

Abstract: In order to achieve a high degree of security, IT systems with sophisticated security requirements increasingly apply security models for specifying, analyzing and implementing their security policies. While this approach achieves considerable improvements in effectiveness and correctness of a system’s security properties, model specification, analysis and implementation are yet quite complex and expensive. This paper focuses on the efficient algorithmic safety analysis of HRU security models. We present the theory and practical application of a method that decomposes a model into smaller and autonomous sub-models that are more efficient to analyze. A recombination of the results then allows to infer safety properties of the original model. A security model for a real-world enterprise resource planning system demonstrates the approach.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.167.52.238

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Fischer, A. and Kühnhauser, W. (2010). EFFICIENT ALGORITHMIC SAFETY ANALYSIS OF HRU SECURITY MODELS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 49-58. DOI: 10.5220/0002986600490058

@conference{secrypt10,
author={Anja Fischer. and Winfried Kühnhauser.},
title={EFFICIENT ALGORITHMIC SAFETY ANALYSIS OF HRU SECURITY MODELS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={49-58},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002986600490058},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - EFFICIENT ALGORITHMIC SAFETY ANALYSIS OF HRU SECURITY MODELS
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Fischer, A.
AU - Kühnhauser, W.
PY - 2010
SP - 49
EP - 58
DO - 10.5220/0002986600490058
PB - SciTePress