{"title":"A logic for reasoning about security","authors":"J. Glasgow, G. MacEwen, P. Panangaden","doi":"10.1109/CSFW.1990.128180","DOIUrl":null,"url":null,"abstract":"A formal framework called security logic (SL) is developed for specifying and reasoning about security policies, and for verifying that system designs adhere to such policies. Included in this framework is a definition of knowledge based on modal logic so that properties can be time-related, a definition of permission, and a definition of obligation. Permission is used to specify secrecy policies, and obligation is used to specify integrity policies. A security policy is given as a set of policy constraints on the SL model. The combination of policies is addressed. Examples based on policies from the current literature are given.<<ETX>>","PeriodicalId":185508,"journal":{"name":"[1990] Proceedings. The Computer Security Foundations Workshop III","volume":"87 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"150","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Proceedings. The Computer Security Foundations Workshop III","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1990.128180","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 150
Abstract
A formal framework called security logic (SL) is developed for specifying and reasoning about security policies, and for verifying that system designs adhere to such policies. Included in this framework is a definition of knowledge based on modal logic so that properties can be time-related, a definition of permission, and a definition of obligation. Permission is used to specify secrecy policies, and obligation is used to specify integrity policies. A security policy is given as a set of policy constraints on the SL model. The combination of policies is addressed. Examples based on policies from the current literature are given.<>