[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/283751.283784acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article
Free access

Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy

Published: 03 August 1993 Publication History
First page of PDF

References

[1]
Bell, D. E., and LaPadula, L. J., Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, The MITRE Corporation, Bedford, Massachusetts, March, 1976.
[2]
Dobson, J. E., Blyth, A. J. C., Chudge, J., and Strens, M. R., "The ORDIT Approach to Requirements Identification," Proceedings of the Sixteenth Annual International Computer Software and Applications Conference. Los Alamitos, California: IEEE Computer Society Press, 1992, pp. 356-361.
[3]
J ajodia, S., and Kogan, B., "integrating an Object-Oriented Data Model with Multilevel Security," Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Los Alamitos, California: IEEE Computer Society Press, 1990, pp. 76-85.
[4]
McLean, J., "The Specification and Modeling of Computer Security," IEEE Computer 23, 11 (1990), pp. 9-16.
[5]
Michael, J. B. A Formal Approach to Testing the Consistency of Composed Security Policies, Ph.D. dissertation, School of Information Technology and Engineering, George Mason University, 1993.
[6]
Michael, J. B., Sibley, E. H., and Wexelblat, R. L., "A Modeling Paradigm for Representing Intentions in Information Systems," Proceedings of the First Workshop on Information Technologies and Systems. Massachusetts Institute of Technology Sloan School of Management, Cambridge, Massachusetts, 1991, pp. 21-34.
[7]
Sibley, E. H., Michael, J. B., and Sandhu, R. S. "A Case-Study of Security Policy for Manual and Automated Systems," In Proceedings of the Sixth Annual Conference on Computer Assurance. IEEE Computer Society Press, Los Alamitos, California, 1991, pp. 63-68.
[8]
Sibley, E. H., Wexelblat, R. L., Michael, J. B., Tanner, M. C., and Littman, D. C., "The Role of Policy in Requirements Definition," Proceedings of lhe IEEE International Symposium on Requirements Engineering. Los Alamitos, California: IEEE Computer Society Press, 1993, pp. 277-280.
[9]
Wahlstrom, B. "Avoiding Technological Risks: The Dilemma of Complexity," Journal of Technological Forecasting and Social Change 42, 4 (1992), pp. 351-365.
[10]
Wilkes, M. V., "Revisiting Computer Security in the Business World," Communications of the A CM 34, 8 (1991), pp. 19-21.

Cited By

View all
  • (2013)Security Policy Alignment: A Formal ApproachIEEE Systems Journal10.1109/JSYST.2012.22219337:2(275-287)Online publication date: Jun-2013
  • (2011)Policy-based approach for dynamic architectural adaptation: A case study on location-based system2011 Malaysian Conference in Software Engineering10.1109/MySEC.2011.6140664(171-176)Online publication date: Dec-2011
  • (2004)Incremental validation of policy-based systemsProceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.10.1109/POLICY.2004.1309176(240-249)Online publication date: 2004
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms
August 1993
198 pages
ISBN:0818654309
DOI:10.1145/283751
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 August 1993

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)28
  • Downloads (Last 6 weeks)5
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Security Policy Alignment: A Formal ApproachIEEE Systems Journal10.1109/JSYST.2012.22219337:2(275-287)Online publication date: Jun-2013
  • (2011)Policy-based approach for dynamic architectural adaptation: A case study on location-based system2011 Malaysian Conference in Software Engineering10.1109/MySEC.2011.6140664(171-176)Online publication date: Dec-2011
  • (2004)Incremental validation of policy-based systemsProceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004.10.1109/POLICY.2004.1309176(240-249)Online publication date: 2004
  • (1999)Conflicts in Policy-Based Distributed Systems ManagementIEEE Transactions on Software Engineering10.1109/32.82441425:6(852-869)Online publication date: 1-Nov-1999

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media