Loading...
Please wait, while we are loading the content...
E-Prime for security: a new security paradigm
| Content Provider | ACM Digital Library |
|---|---|
| Author | Greenwald, Steven J. |
| Abstract | This paper details a true and striking paradigm shift: the use of E-Prime for (at least) user-centered security, organizational/enterprise security policies and informal security policy modeling. In 1965, D. David Bourland, Jr. proposed E-Prime as an addition to Korzybski's General Semantics. Bourland defined E-Prime as that proper subset of the English language that omits any forms of the verb "to be." E-Prime seems desirable because two forms of the verb "to be" have structural problems with security implications that the use of E-Prime would eliminate. I first examine the rationale for E-Prime (reviewing the Sapir-Whorf hypothesis and the relevant parts of General Semantics), and then cover the basics of E-Prime. Next I examine the use of E-Prime with several "before and after" examples in the areas of user-centered security (Microsoft and ZoneAlarm software messages), organizational/enterprise security policy, and informal security policy modeling (including some examples from the U.S. Computer Security Act and the Clark-Wilson model); these examples show how EPrime can make great improvements in eliminating bad structure and how its use can lead to an overall improvement in security. I then present some of the discussion that occurred at the New Security Paradigms Workshop. I conclude with some thoughts for other areas of promising future research, including roles and responsibilities, program management, risk management, planning and the security life cycle, assurance, disaster planning, incident handling, user awareness and training, support and operations, spam detection, security engineering, and automated E-Prime tools. |
| Starting Page | 87 |
| Ending Page | 95 |
| Page Count | 9 |
| File Format | |
| ISBN | 9781595939234 |
| DOI | 10.1145/1278940.1278954 |
| Language | English |
| Publisher | Association for Computing Machinery (ACM) |
| Publisher Date | 2006-09-19 |
| Publisher Place | New York |
| Access Restriction | Subscribed |
| Subject Keyword | E-prime Software life cycle sp800-12 Disaster planning Modeling Spam detection Life cycle Rbac User support and operations User centered security Information assurance Formal methods Security engineering Security life cycle Program management Informal security policy modeling Organizational security policy Security policy modeling Principle of linguistic relativity Enterprise security policy Sapir-whorf hypothesis Role-based access control User training Planning Clark-wilson General semantics Risk management User awareness Incident handling |
| Content Type | Text |
| Resource Type | Article |