文档介绍:munications 23 (2000) 1716–1723
com
Security policy conceptual modeling and formalization
worked information systems
D. Trcˇek*
Institut Jozef Stefan, Dept. of munications works E6, Jamova 39, Ljubljana, Slovenia and College of Management, Cankarjeva 5, Koper,
Slovenia
Abstract
Security worked information systems is a plex task that ranges from the level of crypto-primitives over crypto-protocols to
the level anizational matters and legislation. All this prised in a so-called security policy, which is often treated as an after-
thought. One of the main reasons is the lack of appropriate techniques for conceptual modeling of security policy at early stages of system
design. The approach in this paper is based on flow controls as one of the key ingredients for defining a security policy. Consequent security
services and security architectures are derived by means of the proposed technique, which also bridges the gap to formal techniques. The
result is a formalized output that serves as a basis for further refinement in subsequent stages of the modeling process. ᭧ 2000 Elsevier
Science . All rights reserved.
Keywords: Security architectures; Security policy; Conceptual modeling; Formal methods
1. Introduction needed for addressing security policy at the stage of IS
analysis and design. Besides, being confined to techni-
Providing security in cont