Knowledge System for Application of Computer Security Rules

  • Menchaca García Felipe Rolando
  • Contreras Hernández Salvador
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 63)


Epistemic Logic is applied to diverse fields of the computing science, particularly to those related to systems constituted by agents. Such systems have an interesting range of applications themselves. In this paper, a logic system applied to the evaluation of Multilevel and Commercial computer security rules is discussed. The system is defined by axioms and rules, and the concepts of the security models are then considered in order to evaluate the rules. It is showed how to lead to certain formulas in order to determine the validity of the set of fundamental expressions that constitute the security models. It uses a system S5.


possible worlds knowledge common knowledge ontology security rules 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Vázquez-Gómez, J.: Modelling Multidomain Security SIGSAC. In: New Security Paradigm workshop. IEEE Computer Society Press, Los Alamitos (1993)Google Scholar
  2. 2.
    Vázquez-Gómez, J.: Multidomain Security. Computers & Security 13, 161–184 (1994)CrossRefGoogle Scholar
  3. 3.
    Bell, D.E., La Padula, L.J.: Security Computer Systems: Mathematical Foundations and Model. Tech. Rep., MITRE Corp., Bedford MA (1974)Google Scholar
  4. 4.
    Chellas, B.F.: Modal Logic an Introduction. Cambridge University Press, Cambridge (1995)Google Scholar
  5. 5.
    Baral, C., Zhang, Y.: On the semantics of knowledge update. In: Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI 2001), Seattle, WA, pp. 97–102. Morgan Kaufmann, San Mateo (2001)Google Scholar
  6. 6.
    Halpern, J.Y., Moses, Y.: Knowledge and common knowledge in a distributed environment. J. ACM 37(3), 549–587 (1990), zbMATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Glassgow, J., MacEwen, G., Panangaden, P.: A logic for reasoning about security. ACM Trans. Comput. Syst. 10(3) (August 1992)Google Scholar
  8. 8.
    Glassgow, J., Mac Ewen, G.: Obligation as the basis of integrity especification. In: Proc. Computer Security Fundations Workshop, Franconia, NH (June 1989)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Menchaca García Felipe Rolando
    • 1
  • Contreras Hernández Salvador
    • 1
  1. 1.Computer research Center-IPN, Av. Juan de Dios Bátiz, esquina con Miguel Otón de MendizábalMéxicoMéxico

Personalised recommendations