18th IEEE Computer Security Foundations Workshop (CSFW'05)
DOI: 10.1109/csfw.2005.20
|View full text |Cite
|
Sign up to set email alerts
|

Nomad: A Security Model with Non Atomic Actions and Deadlines

Abstract: Modelling security policies requires means to specify permissions and prohibitions. However, this is generally not sufficient to express security properties such as availability and obligations must be also considered. By contrast to permissions and prohibitions, obligations are often associated with deadlines to specify bounded time availability requirements. In this case, a violation only occurs if the obliged action is not performed before the deadline. On the other hand, when specifying high level security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
3

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 46 publications
(31 citation statements)
references
References 17 publications
0
28
0
3
Order By: Relevance
“…However, it is clear that this formalism may be not sufficient to deal with arbitrary security rules, and that more specific operator/modalities need to be considered. One can think for instance of a triggered obligation bounded by an event (and not by an arbitrary timeout), or of some of the general operators proposed in the Nomad logic [3]. Further work remains to be done in order to check which of these operators could be supported by our tile-based approach.…”
Section: Perspectivesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, it is clear that this formalism may be not sufficient to deal with arbitrary security rules, and that more specific operator/modalities need to be considered. One can think for instance of a triggered obligation bounded by an event (and not by an arbitrary timeout), or of some of the general operators proposed in the Nomad logic [3]. Further work remains to be done in order to check which of these operators could be supported by our tile-based approach.…”
Section: Perspectivesmentioning
confidence: 99%
“…2 There should be no user account on relays placed in the DMZ. 3 Mailbox servers containing user accounts should be in the private zone. There could be as many of these servers as necessary.…”
Section: Nomentioning
confidence: 99%
“…Bellow, we recall a part of the Nomad grammar. The complete definition of the Nomad language can be found in Cuppens et al (2005).…”
Section: Nomad Test Patternsmentioning
confidence: 99%
“…Each criterion can be also modelled formally by means of security rules written with languages such as XACML (eXtensible Access Control Markup Language OASIS standards organization (2009)), Nomad (Security Model with Non Atomic Actions and Deadlines Cuppens et al (2005)), or OrBAC (Organisation-based access control Kalam et al (2003)). …”
Section: Web Services Security Overviewmentioning
confidence: 99%
See 1 more Smart Citation