Abstract
An extended Petri net formalism which can be used to model information flow security requirements is described. The proposed framework can be used to specify a range of security policies by making specific choices for the components of the model. It is believed that Petri nets provide an elegant way of modeling security policies in a distributed system. The ability to model concurrency, the structural generality of Petri nets, and the existence of powerful analytical techniques make the Petri-net modeling approach even more useful. Two examples are given to illustrate the use of such a model.
Original language | English |
---|---|
Title of host publication | Proceedings. The Computer Security Foundations Workshop III |
Place of Publication | Piscataway, N.J. |
Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
Pages | 51-61 |
Number of pages | 11 |
ISBN (Print) | 0818620714 |
DOIs | |
Publication status | Published - Jun 1990 |
Externally published | Yes |
Event | Proceedings of the Computer Security Foundations Workshop III - Franconia, NH, USA Duration: 12 Jun 1990 → 14 Jun 1990 |
Other
Other | Proceedings of the Computer Security Foundations Workshop III |
---|---|
City | Franconia, NH, USA |
Period | 12/06/90 → 14/06/90 |