Modeling insecurity: Policy engineering for survivability

Prasad Naldurg, Roy H. Campbell

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present an access-control policy specification and verification process that is well-suited to model survivability of information resources under threat of compromise. Our process differs from the traditional policy engineering methodology in many ways. First, we contend that traditional safety-property modeling cannot provide any guarantees when the policy enforcement mechanisms are compromised. Therefore, we extend traditional access control specifications by modeling insecure states and transitions explicitly, to describe possible system behavior after compromise. Next, we observe that it may not always possible to recover from an insecure state, and both compromise and recovery impact the availability of information. Based on these observations, we refine traditional information security properties as liveness assertions and explicitly add recovery actions to our specifications, to guarantee resources are available to legitimate users infinitely often, in spite of malicious attacks or inadvertent compromise. We explain our process using an example behavioral specification and show how we can define different measures of availability and verify them using standard model-checking techniques within this framework.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with 10th ACM Conference on Computer Communications Security)
EditorsP. Liu, P. Pal
Pages91-98
Number of pages8
StatePublished - 2003
EventProceedings of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with 10th ACM Conference on Computer Communications Security) - Fairfax, VA, United States
Duration: Oct 31 2003Oct 31 2003

Publication series

NameProceedings of the ACM Workshop on Survivable and Self-Regenerative Systems

Other

OtherProceedings of the ACM Workshop on Survivable and Self-Regenerative Systems (In Association with 10th ACM Conference on Computer Communications Security)
Country/TerritoryUnited States
CityFairfax, VA
Period10/31/0310/31/03

Keywords

  • Access control models
  • Availability
  • Liveness
  • Security policies
  • Survivability

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Modeling insecurity: Policy engineering for survivability'. Together they form a unique fingerprint.

Cite this