A Modal Logic for Information System Security
نویسندگان
چکیده
As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specified by the system security agent. Authorization specification has been extensively studied and a variety of approaches have been investigated. In this paper, we propose a knowledge oriented formal language to specify the system security policies and their reasoning in response to system resource access request. The semantics of our language is provided by translating our language into epistemic logic program in which knowledge related modal operators are employed to represent agents’ knowledge in reasoning. We demonstrate how our authorization language handles the situation where the security agent’s knowledge on access decision is incomplete.
منابع مشابه
Ell Secure Information System Using Modal Logic Technique
In this paper, the authors propose a formal logic technique to protect information systems. As the widespread use of computer systems grows, the security of the information stored in such systems has become more important. As a security mechanism, authorization or access control ensures that all accesses to the system resources occur exclusively according to the access polices and rules specifi...
متن کاملA Modal Logical Framework for Security Policies
It turns out that security becomes more and more important in many information systems. In this paper, we are more speci cally interested in con dentiality requirement. In this context, we show how knowledge representation techniques based on formal logic can be used to propose a faithful model of con dentiality. Our approach is to develop a modal logical framework which combines doxastic and d...
متن کاملHybridization of Facial Features and Use of Multi Modal Information for 3D Face Recognition
Despite of achieving good performance in controlled environment, the conventional 3D face recognition systems still encounter problems in handling the large variations in lighting conditions, facial expression and head pose The humans use the hybrid approach to recognize faces and therefore in this proposed method the human face recognition ability is incorporated by combining global and local ...
متن کاملBelief, information acquisition, and trust in multi-agent systems--A modal logic formulation
In this paper, we consider the influence of trust on the assimilation of acquired information into an agent’s belief. By use of modal logic, we semantically and axiomatically characterize the relationship among belief, information acquisition and trust. The belief and information acquisition operators are respectively represented by KD45 and KD normal modalities, whereas trust is denoted by a m...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کامل