Abstract
An extended Petri net formalism which can be used to model information flow security requirements is described. The proposed framework can be used to specify a range of security policies by making specific choices for the components of the model. It is believed that Petri nets provide an elegant way of modeling security policies in a distributed system. The ability to model concurrency, the structural generality of Petri nets, and the existence of powerful analytical techniques make the Petri-net modeling approach even more useful. Two examples are given to illustrate the use of such a model.
| Original language | English |
|---|---|
| Title of host publication | Proceedings. The Computer Security Foundations Workshop III |
| Place of Publication | Piscataway, N.J. |
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Pages | 51-61 |
| Number of pages | 11 |
| ISBN (Print) | 0818620714 |
| DOIs | |
| Publication status | Published - Jun 1990 |
| Externally published | Yes |
| Event | Proceedings of the Computer Security Foundations Workshop III - Franconia, NH, USA Duration: 12 Jun 1990 → 14 Jun 1990 |
Other
| Other | Proceedings of the Computer Security Foundations Workshop III |
|---|---|
| City | Franconia, NH, USA |
| Period | 12/06/90 → 14/06/90 |
Fingerprint
Dive into the research topics of 'Petri net based modelling of information flow security requirements'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver