TY - GEN
T1 - Policy-based design and verification for mission assurance
AU - Chin, Shiu Kai
AU - Muccio, Sarah
AU - Older, Susan
AU - Vestal, Thomas N.J.
PY - 2010
Y1 - 2010
N2 - Intelligent systems often operate in a blend of cyberspace and physical space. Cyberspace operations - planning, actions, and effects in realms where signals affect intelligent systems - often occur in milliseconds without human intervention. Decisions and actions in cyberspace can affect physical space, particularly in SCADA - supervisory control and data acquisition - systems. For critical military missions, intelligent and autonomous systems must adhere to commander intent and operate in ways that assure the integrity of mission operations. This paper shows how policy, expressed using an access-control logic, serves as a bridge between commanders and implementers. We describe an access-control logic based on a multi-agent propositional modal logic, show how policies are described, how access decisions are justified, and give examples of how concepts of operations are analyzed. Our experience is policy-based design and verification is within the reach of practicing engineers. A logical approach enables engineers to think precisely about the security and integrity of their systems and the missions they support.
AB - Intelligent systems often operate in a blend of cyberspace and physical space. Cyberspace operations - planning, actions, and effects in realms where signals affect intelligent systems - often occur in milliseconds without human intervention. Decisions and actions in cyberspace can affect physical space, particularly in SCADA - supervisory control and data acquisition - systems. For critical military missions, intelligent and autonomous systems must adhere to commander intent and operate in ways that assure the integrity of mission operations. This paper shows how policy, expressed using an access-control logic, serves as a bridge between commanders and implementers. We describe an access-control logic based on a multi-agent propositional modal logic, show how policies are described, how access decisions are justified, and give examples of how concepts of operations are analyzed. Our experience is policy-based design and verification is within the reach of practicing engineers. A logical approach enables engineers to think precisely about the security and integrity of their systems and the missions they support.
KW - Access control
KW - Concept of operations
KW - Logic
KW - Policy
UR - http://www.scopus.com/inward/record.url?scp=78649301405&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78649301405&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-14706-7_10
DO - 10.1007/978-3-642-14706-7_10
M3 - Conference contribution
AN - SCOPUS:78649301405
SN - 3642147054
SN - 9783642147050
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 125
EP - 138
BT - Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings
T2 - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010
Y2 - 8 September 2010 through 10 September 2010
ER -