Incremental update of constraint-compliant policy rules

نویسندگان

  • Paolo Bottoni
  • Andrew Fish
  • Francesco Parisi-Presicce
چکیده

Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modifications of constraints, by identifying which components of the rule have to be updated. Moreover, we show the construction of sets of rules, directly derived from a positive constraint, to guarantee constraint preservation and constraint enforcement.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Semantic Update Optimization in Active Databases

In an active database, an update may be constrained by integrity constraints, and may also trigger rules that, in turn, may a ect the database state. The general problem is to e ect the update while also managing the \side-e ects" of constraint enforcement and rule execution. In this paper an update calculus is proposed by which updates, constraints and rules are speci ed and managed within the...

متن کامل

A practical mandatory access control model for XML databases

A practical mandatory access control (MAC) model for XML databases is presented in this paper. The label type and label access policy can be defined according to the requirements of different applications. In order to preserve the integrity of data in XML databases, a constraint between a read-access rule and a write-access rule in label access policy is introduced. Rules for label assignment a...

متن کامل

Incremental Adaptation of Constraint Handling Rule Derivations ?

Constraint solving in dynamic environments requires an immediate adaptation of previously evaluated solutions of constraint satisfaction problems if these problems are changed. After a change, an adapted solution is preferred which is stable, i.e. as close as possible to the original solution. A wide range of incremental constraint solving methods for dynamic nite domain constraint satisfaction...

متن کامل

Electrical Engineering and Computer Science Compiling Minimum Incremental Update for Modular SDN Languages

Measurement results show that updating rules on switches poses major latency overhead during the course of the policy update. However, current SDN policy compilers do not handle policy updates well and generate large amount of redundant rule updates, most of which modify only the priority field. Our analysis shows that the lack of knowledge on the rule dependency and the consecutively distribut...

متن کامل

Monetary and Macro-prudential Policies: An Integrated Analysis

This paper studies the interaction between monetary and macro-prudential policies in a simple model with both nominal and financial frictions. The nominal friction gives rise to a conventional monetary policy objective emphasized in the New Keynesian literature. The financial friction, in the form of an occasionally binding collateral constraint, gives rise to a financial stability objective. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • ECEASST

دوره 39  شماره 

صفحات  -

تاریخ انتشار 2011