Catherine Meadows and D.Pavlovic
Although the problems of physical security emerged more than 10,000 years before the problems of computer security, no formal methods have been developed for them, and the solutions have been evolving slowly, mostly through social procedures. But as the traffic on physical and social networks is now increasingly expedited by computers, the problems of physical and social security are becoming technical problems. From various directions, many security researchers and practitioners have come to a realization that the areas such as transportation security, public and private space protection, or critical infrastructure defense, are in need of formalized engineering methodologies. Following this lead, we extended Protocol Derivation Logic (PDL) to Procedure Derivation Logic (still PDL). In contrast with a protocol, where some principals send and receive some messages, in a procedure they can also exchange and move some objects. For simplicity, in the present paper we actually focus on the security issues arising from traffic of objects, and leave the data flows, and the phenomena emerging from the interaction of data and objects, for future work. We illustrate our approach by applying it to a flawed airport security procedure described by Schneier.
Keywords: formal security protocol analysis, physical procedure analysis, physical security, security policies
Date: September 14, 2012
Presented: 8th International Workshop on Security and Trust Management (STM 2012), Pisa, Italy, September 13-14, 2012.
Published: Security and Trust Management‚ STM 2012, Lecture Notes in Computer Science vol 7783, 2012, pp. 193-208.
Publisher URL: http://link.springer.com/chapter/10.1007/978-3-642-38004-4_13
Full Text: http://link.springer.com/content/pdf/10.1007%2F978-3-642-38004-4_13.pdf