Home > Publications
Home University of Twente
Prospective Students
Intranet (internal)

EEMCS EPrints Service

770 Modelling mobility aspects of security policies
Home Policy Brochure Browse Search User Area Contact Help

Hartel, P.H. and van Eck, P.A.T. and Etalle, S. and Wieringa, R.J. (2004) Modelling mobility aspects of security policies. (Invited) In: Construction and Analysis of Safe, Secure and Interoperable Smart cards (CASSIS), March 10-14, 2004, Marseille, France. pp. 172-191. Lecture Notes in Computer Science 3362. Springer-Verlag. ISBN 3-540-24287-2

Full text available as:


364 Kb
Open Access

Official URL:


Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increased hardware and software mobility forces us to consider those rules in an integrated fashion. We present SPIN models of four case studies where mobility plays a role. In each case the model captures both the system of interest and its security policy. The model is then formally checked against a property that represents a principle from the problem domain. The model checking activity shows many examples of policies that are too weak to cope with mobility.

Item Type:Conference or Workshop Paper (Full Paper, Invited/Keynote Talk)
Research Group:EWI-DIES: Distributed and Embedded Security, EWI-IS: Information Systems
Research Program:CTIT-ISTRICE: Integrated Security and Privacy in a Networked World
Research Project:Inspired: Integrated Secure Platform for Interactive Personal Devices, VISPER: The VIrtual Security PERimeter for digital, physical, and organisational security
Additional Information:Imported from DIES
ID Code:770
Deposited On:12 December 2005
More Information:statistics

Export this item as:

To correct this item please ask your editor

Repository Staff Only: edit this item