Modelling and Simulating Systems Security Policy

Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simu...

Full description

Bibliographic Details
Main Authors: Tristan Caulfield, David Pym
Format: Article
Language:English
Published: European Alliance for Innovation (EAI) 2016-12-01
Series:EAI Endorsed Transactions on Security and Safety
Subjects:
Online Access:http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765
id doaj-c65f0a2e99434a3caf3db6b49ad55fe0
record_format Article
spelling doaj-c65f0a2e99434a3caf3db6b49ad55fe02020-11-25T01:28:34ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932016-12-013811010.4108/eai.24-8-2015.2260765Modelling and Simulating Systems Security PolicyTristan Caulfield0David Pym1University College London; t.caulfield@ucl.ac.ukUniversity College LondonSecurity managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simulation—can be used to explore the operational consequences of their design choices and help security managers to make better decisions. The methodology is based on constructing executable system models that illustrate the effects of different policy choices. Models are compositional, allowing complex systems to be expressed as combinations of smaller, complete models. They capture the logical and physical structure of systems, the choices and behaviour of agents within the system, and the security managers’ preferences about outcomes. Utility theory is used to describe the extent to which security managers’ policies deliver their security objectives. Models are parametrized based on data obtained from observations of real-world systems that correspond closely to the examples described.http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765compositiondecisionlocationlogicmodellingpolicyprocessresourcesecuritysemanticssimulation
collection DOAJ
language English
format Article
sources DOAJ
author Tristan Caulfield
David Pym
spellingShingle Tristan Caulfield
David Pym
Modelling and Simulating Systems Security Policy
EAI Endorsed Transactions on Security and Safety
composition
decision
location
logic
modelling
policy
process
resource
security
semantics
simulation
author_facet Tristan Caulfield
David Pym
author_sort Tristan Caulfield
title Modelling and Simulating Systems Security Policy
title_short Modelling and Simulating Systems Security Policy
title_full Modelling and Simulating Systems Security Policy
title_fullStr Modelling and Simulating Systems Security Policy
title_full_unstemmed Modelling and Simulating Systems Security Policy
title_sort modelling and simulating systems security policy
publisher European Alliance for Innovation (EAI)
series EAI Endorsed Transactions on Security and Safety
issn 2032-9393
publishDate 2016-12-01
description Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simulation—can be used to explore the operational consequences of their design choices and help security managers to make better decisions. The methodology is based on constructing executable system models that illustrate the effects of different policy choices. Models are compositional, allowing complex systems to be expressed as combinations of smaller, complete models. They capture the logical and physical structure of systems, the choices and behaviour of agents within the system, and the security managers’ preferences about outcomes. Utility theory is used to describe the extent to which security managers’ policies deliver their security objectives. Models are parametrized based on data obtained from observations of real-world systems that correspond closely to the examples described.
topic composition
decision
location
logic
modelling
policy
process
resource
security
semantics
simulation
url http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765
work_keys_str_mv AT tristancaulfield modellingandsimulatingsystemssecuritypolicy
AT davidpym modellingandsimulatingsystemssecuritypolicy
_version_ 1725100850461802496