As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Interactions may arise as a result of deploying multiple secrecy (or security) models in a system, i.e. they can arise in hybrid secrecy or security models. To detect and report these issues we propose the use of logic analyzers to determine if the involved secrecy models are mutually coherent and hence they can coexist, as well as the conditions under which they can coexist. We present our preliminary results with respect to secrecy models such as Chinese Wall, Bell-LaPadula, and Delegation of Authority. Our method is based on representing models and policies using the formal technique Alloy, however the method's principles are conjectured to be generic and hence should apply to any secrecy or security model, with different logic-based tools.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.