Tableau systems for reasoning about risk

Original Research

Abstract

In order to evaluate the effectiveness of the security measures undertaken to protect a distributed system (e.g., protecting privacy of data in a network or in an information system) one should, among other things, perform a risk assessment. In this paper, we introduce a logical framework that allows one to reason about risk by means of operators that formalize causes, effects, preconditions, prevention and mitigation of events that may occur in the system. We give tableau rules and discuss a number of interesting variants that could be considered, prove soundness and completeness for some of the resulting tableau systems, and give an algorithm for satisfiability.

Keywords

Risk Cause Precondition Prevention Mitigation Tableau system 

References

  1. AVANTSSAR (2008) Deliverable 5.1: problem cases and their trust and security requirements. http://www.avantssar.eu
  2. Aven T (2004) Risk analysis and science. Int J Reliab Qual Safety Eng 11(1):1–15CrossRefGoogle Scholar
  3. Bartsch S (2010) A calculus for the qualitative risk assessment of policy override authorization. In: Makarevich OB, Elçi A, Orgun MA, Huss S A, Babenko LK, Chefranov AG, Varadharajan V (eds) Proceedings of the 3rd international conference on security of information and networks, SIN 2010, ACM, pp 62–70Google Scholar
  4. Basin D, D’Agostino M, Gabbay DM, Matthews S, Viganò L (eds) (2000) Labelled deduction. Kluwer, Dordrecht Google Scholar
  5. Basin DA, Caleiro C, Ramos J, Viganò L (2009) Labelled tableaux for distributed temporal logic. J Logic Comput 19(6):1245–1279CrossRefMATHMathSciNetGoogle Scholar
  6. Bell J (2003) A common sense theory of causation. In: Blackburn P, Ghidini C, Turner RM, Giunchiglia F (eds) Modeling and using context, LNCS, vol 2680. Springer, pp 40–53Google Scholar
  7. Chapin PC, Skalka C, Wang XS (2005) Risk assessment in distributed authorization. In: Atluri V, Samarati P, Küsters R, Mitchell JC (eds) Proceedings of the 2005 ACM workshop on formal methods in security engineering, FMSE 2005, ACM, pp 33–42Google Scholar
  8. Cristani M, Karafili E, Viganò L (2012) Towards a logical framework for reasoning about risk. In: Quirchmayr G, Basl J, You I, Xu L, Weippl E (eds) CD-ARES 2012, Proceedings of the 2nd IFIP international workshop on security and cognitive informatics for Homeland Defense (SeCIHD’12), in conjunction with ARES 2012, LNCS, vol 7465. Springer, pp 609–623Google Scholar
  9. de Ru WG, Eloff JHP (1996) Risk analysis modelling with the use of fuzzy logic. Comput Secur 15(3):239–248CrossRefGoogle Scholar
  10. D’Agostino M, Gabbay DM, Hähnle R, Posegga J (eds) (1999) Handbook of tableau methods. Kluwer, Dordrecht Google Scholar
  11. Dunn JM (1995) Positive modal logic. Studia Logica 55:301–317CrossRefMATHMathSciNetGoogle Scholar
  12. Gabbay DM (1996) Labelled deductive systems. Clarendon Press, OxfordGoogle Scholar
  13. Giunchiglia E, Lee J, Lifschitz V, McCain N, Turner H (2004) Nonmonotonic causal theories. Artif Intell 153(1–2):49–104CrossRefMATHMathSciNetGoogle Scholar
  14. Goré R (1999) Tableau methods for modal and temporal logics. In: D’Agostino M, Gabbay DM, Hähnle R, Posegga J (eds) The handbook of tableau methods. Kluwer, DordrechtGoogle Scholar
  15. Huang C, Moraga C (2002) A fuzzy risk model and its matrix algorithm. Int J Uncertaint Fuzziness Knowl Based Syst 10(4):347–362CrossRefMATHMathSciNetGoogle Scholar
  16. Lewis D (1973) Causation. J Philos 70(17):556–567CrossRefGoogle Scholar
  17. Lewis D (2000) Causation as influence. J Philos 97(4):182–197CrossRefGoogle Scholar
  18. Li N, Mitchell JC (2003) A role-based trust-management framework. In: 3rd DARPA information survivability conference and exposition (DISCEX-III 2003). IEEE Computer Society, pp 201–212Google Scholar
  19. Masini A, Viganò L, Volpe M (2010) A history of until. Electron Notes Theor Comput Sci 262:189–204CrossRefGoogle Scholar
  20. Schneidewind N (2009) Software risk analysis. Int J Reliab Quality Safety Eng 16(2):117–136CrossRefGoogle Scholar
  21. Shafer G, Gillett PR, Scherl RB (2000) The logic of events. Ann Math Artif Intell 28(1–4):315–389CrossRefMATHMathSciNetGoogle Scholar
  22. Singh A, Lilja DJ (2009) Improving risk assessment methodology: a statistical design of experiments approach. In: Elçi A, Makarevich OB, Orgun MA, Chefranov AG, Pieprzyk J, Bryukhomitsky YA, Örs SB (eds) Proceedings of the 2nd international conference on security of information and networks, SIN 2009, ACM, pp 21–29Google Scholar
  23. Tan L, Xu S (2009) A model-checking-based approach to risk analysis in supply chain consolidations. Integr Comput Aided Eng 16(3):243–257Google Scholar
  24. Terenziani P, Torasso P (1995) Time, action-types, causation: an integrated analysis. Comput Intell 11:529–552CrossRefGoogle Scholar
  25. Turner H (1999) A logic of universal causation. Artif Intell 113(1–2):87–123CrossRefMATHMathSciNetGoogle Scholar
  26. Viganò L (2000) Labelled non-classical logics. Kluwer, DordrechtGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  1. 1.Dipartimento di InformaticaUniversità di VeronaVeronaItaly

Personalised recommendations