Abstract
The paper discusses approach for testing security policies enforcement and weakness and enterprises it’s implementation for keeping assurance in system protection. Using such techniques it is possible to examine the protections of thousands of security-related objects on a multi-user system and identify security drawbacks. By acting on this information, security officer or system administrator can significantly reduce their system security exposure. The document examines theoretical foundations for design the safety evaluation toolkit. Finally, paper describes a functional structure of the integrated evaluation workshop based on the security analyzing kernel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA (1997)
Hoagland, J.A., Panday, R., Levitt, K.N.: Security Policy Specification Using a Graphical Approach. Tech. report CSE-98-3, UC Davis Computer Science Dept. (1998)
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Proc. Policy 2001: Workshop on Policies for Distributed Systems and Networks, Bristol, UK (2001)
Goguen, J., Meseguer, J.: Security policies and security models. In: Proc. of the 1982 IEEE Symposium on Security and Privacy, Oakland, CA (1982)
McLean, J.: Reasoning about security models. In: Proc. of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA (1987)
McLean, J.: The Algebra of Security. In: Proc. 1988 IEEE Symposium on Security and Privacy (April 1988)
McLean, J.: Security models and information flow. In: Proc. 1990 IEEE Symposium on Security and Privacy (May 1990)
Bell, D., LaPadula, L.: Secure Computer Systems: Unified Exposition and Multics Interpretation, Technical Report, MTR-2997, MITRE, Bedford, Mass (1975)
Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communications of the ACM 19(8), 461–471 (1976)
Bratko, I.: PROLOG Programming for Artificial Intelligence, 3rd edn. Addison-Wesley Pub Co, Reading (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zegzhda, P.D., Zegzhda, D.P., Kalinin, M.O. (2003). Logical Resolving for Security Evaluation. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive