Modelling and Simulating Systems Security Policy
Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simu...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
European Alliance for Innovation (EAI)
2016-12-01
|
Series: | EAI Endorsed Transactions on Security and Safety |
Subjects: | |
Online Access: | http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765 |
id |
doaj-c65f0a2e99434a3caf3db6b49ad55fe0 |
---|---|
record_format |
Article |
spelling |
doaj-c65f0a2e99434a3caf3db6b49ad55fe02020-11-25T01:28:34ZengEuropean Alliance for Innovation (EAI)EAI Endorsed Transactions on Security and Safety2032-93932016-12-013811010.4108/eai.24-8-2015.2260765Modelling and Simulating Systems Security PolicyTristan Caulfield0David Pym1University College London; t.caulfield@ucl.ac.ukUniversity College LondonSecurity managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simulation—can be used to explore the operational consequences of their design choices and help security managers to make better decisions. The methodology is based on constructing executable system models that illustrate the effects of different policy choices. Models are compositional, allowing complex systems to be expressed as combinations of smaller, complete models. They capture the logical and physical structure of systems, the choices and behaviour of agents within the system, and the security managers’ preferences about outcomes. Utility theory is used to describe the extent to which security managers’ policies deliver their security objectives. Models are parametrized based on data obtained from observations of real-world systems that correspond closely to the examples described.http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765compositiondecisionlocationlogicmodellingpolicyprocessresourcesecuritysemanticssimulation |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Tristan Caulfield David Pym |
spellingShingle |
Tristan Caulfield David Pym Modelling and Simulating Systems Security Policy EAI Endorsed Transactions on Security and Safety composition decision location logic modelling policy process resource security semantics simulation |
author_facet |
Tristan Caulfield David Pym |
author_sort |
Tristan Caulfield |
title |
Modelling and Simulating Systems Security Policy |
title_short |
Modelling and Simulating Systems Security Policy |
title_full |
Modelling and Simulating Systems Security Policy |
title_fullStr |
Modelling and Simulating Systems Security Policy |
title_full_unstemmed |
Modelling and Simulating Systems Security Policy |
title_sort |
modelling and simulating systems security policy |
publisher |
European Alliance for Innovation (EAI) |
series |
EAI Endorsed Transactions on Security and Safety |
issn |
2032-9393 |
publishDate |
2016-12-01 |
description |
Security managers face the challenge of designing security policies that deliver the objectives required by their organizations. We explain how a rigorous modelling framework and methodology—grounded in semantically justified mathematical systems modelling, the economics of decision-making, and simulation—can be used to explore the operational consequences of their design choices and help security managers to make better decisions. The methodology is based on constructing executable system models that illustrate the effects of different policy choices. Models are compositional, allowing complex systems to be expressed as combinations of smaller, complete models. They capture the logical and physical structure of systems, the choices and behaviour of agents within the system, and the security managers’ preferences about outcomes. Utility theory is used to describe the extent to which security managers’ policies deliver their security objectives. Models are parametrized based on data obtained from observations of real-world systems that correspond closely to the examples described. |
topic |
composition decision location logic modelling policy process resource security semantics simulation |
url |
http://eudl.eu/doi/10.4108/eai.24-8-2015.2260765 |
work_keys_str_mv |
AT tristancaulfield modellingandsimulatingsystemssecuritypolicy AT davidpym modellingandsimulatingsystemssecuritypolicy |
_version_ |
1725100850461802496 |