Policy-based design and verification for mission assurance

Shiu Kai Chin, Sarah Muccio, Susan Older, Thomas N.J. Vestal

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

Intelligent systems often operate in a blend of cyberspace and physical space. Cyberspace operations - planning, actions, and effects in realms where signals affect intelligent systems - often occur in milliseconds without human intervention. Decisions and actions in cyberspace can affect physical space, particularly in SCADA - supervisory control and data acquisition - systems. For critical military missions, intelligent and autonomous systems must adhere to commander intent and operate in ways that assure the integrity of mission operations. This paper shows how policy, expressed using an access-control logic, serves as a bridge between commanders and implementers. We describe an access-control logic based on a multi-agent propositional modal logic, show how policies are described, how access decisions are justified, and give examples of how concepts of operations are analyzed. Our experience is policy-based design and verification is within the reach of practicing engineers. A logical approach enables engineers to think precisely about the security and integrity of their systems and the missions they support.

Original languageEnglish (US)
Title of host publicationComputer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings
Pages125-138
Number of pages14
DOIs
StatePublished - 2010
Event5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010 - St. Petersburg, Russian Federation
Duration: Sep 8 2010Sep 10 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6258 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010
Country/TerritoryRussian Federation
CitySt. Petersburg
Period9/8/109/10/10

Keywords

  • Access control
  • Concept of operations
  • Logic
  • Policy

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Policy-based design and verification for mission assurance'. Together they form a unique fingerprint.

Cite this