@conference { ISI:000360829800037, title = {Automata-Based Approach to Design and Analyze Security Policies}, booktitle = {2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST)}, year = {2014}, note = {12th Annual International Conference on Privacy, Security and Trust (PST), Ryerson Univ, Toronto, CANADA, JUL 23-24, 2014}, pages = {306-313}, abstract = {Information systems must be controlled by security policies to protect them from undue accesses. Security policies are often designed by rules expressed using informal text, which implies ambiguities and inconsistencies in security rules. Our objective in this paper is to develop a formal approach to design and analyze security policies. We propose a procedure that synthesizes an automaton which implements a given security policy. Our automata-based approach can be a common basis to analyze several aspects of security policies. We use our automata-based approach to develop three analysis procedures to: verify completeness of a security policy, detect anomalies in a security policy, and detect functional discrepancies between several implementations of a security policy. We illustrate our approach using examples of security policies for a firewall.}, isbn = {978-1-4799-3503-1}, author = {Krombi, Wadie and Erradi, Mohammed and Khoumsi, Ahmed}, editor = {Miri, A and Hengartner, U and Huang, NF and Josang, A and GarciaAlfaro, J} }