Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 16

(01) …
(02) SETS
(03) USERS_IMP = ;
(04) ROLES_IMP = ;
(05) OBJECTS_IMP =
;
(06) ACTIONS_IMP = ;
(07) VARIABLES
(08) UsersRolesAssig_IMP, RolesHierarchy_IMP, PermissionsRolesAssig_IMP, PermissionsUsersAssig_IMP,
(09) INVARIANT
(10) UsersRolesAssg_IMP: USERS_IMP POW(ROLES_IMP) &
(11) RolesHierarchy_IMP: ROLES_IMP ROLES_IMP &
(12) PermissionsRolesAssig_IMP: ROLES_IMP (OBJECTS_IMP POW(ACTIONS_IMP)) & …
(13) PermissionsUsersAssig_IMP: USERS_IMP (OBJECTS_IMP POW(ACTIONS_IMP)) & …
(14) INITIALISATION
(15) UsersRolesAssg_IMP ≔ ), Marie
), (Alice ), (Charles ),
(Paul   
(16) RolesHierarchy_IMP ≔ SystemAdministrator), (Director SystemUser),
(SupervisorSystemUser),   
(17) PermissionsRolesAssig_IMP ≔ (Meeting , read, delete,
)), (SystemAdministrator(Meeting )), (SystemAdministrator
(Person)), (Supervisor (Meeting )),
(Supervisor (MeetingCancel ),  (Supervisor (MeetingNotify
), (Cosupervisor(Meeting )), (cosupervisor
(MeetingCancel ), (cosupervisor (MeetingNotify
)),(Director (Meeting )), (Director (Meeting
)), (Director (Person   
(18) PermissionsUsersAssig_IMP ≔
(19) …