document/root.tex
changeset 5 8a6e12a9800d
parent 2 301f567e2a8e
child 10 569222a42cf5
equal deleted inserted replaced
4:8b6ba7168f2d 5:8a6e12a9800d
   103 this resource. We also prove the opposite: if a policy does not
   103 this resource. We also prove the opposite: if a policy does not
   104 prevent a security compromise of a resource, then there is a sequence
   104 prevent a security compromise of a resource, then there is a sequence
   105 of events that will compromise it.  Consequently, a static policy
   105 of events that will compromise it.  Consequently, a static policy
   106 check is sufficient (sound and complete) in order to guarantee or
   106 check is sufficient (sound and complete) in order to guarantee or
   107 expose the security of resources before running the system.  Our
   107 expose the security of resources before running the system.  Our
   108 formal models and correctness proofs are mechanised in the
   108 formal model and correctness proof are mechanised in the
   109 Isabelle/HOL theorem prover using Paulson's inductive method for
   109 Isabelle/HOL theorem prover using Paulson's inductive method for
   110 reasoning about valid sequences of events. Our results apply to the
   110 reasoning about valid sequences of events. Our results apply to the
   111 Role-Compatibility Model, but can be readily adapted to other
   111 Role-Compatibility Model, but can be readily adapted to other
   112 role-based access control models.
   112 role-based access control models.
   113 \end{abstract}
   113 \end{abstract}