A Graph-based Language for Specifying Security Policies
نویسندگان
چکیده
A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, and (3) other formal operations on policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy and a system description are independently specified. LaSCO policies are specified as expressions in a quantifier-free logic, but also, to provide visualization, as directed graphs. Formal semantics have been defined. LaSCO can be used for policy requirements that conform to its very general object-based system model. The implementation of LaSCO is in Java, and automatically generates wrappers to check Java program executions with respect to a policy.
منابع مشابه
XML-Based Access Control Languages
One of the most challenging problems in managing large, distributed, and heterogeneous networked systems is specifying and enforcing security policies regulating interactions between parties and access to services and resources. Recent proposals for specifying and exchanging access control policies adopt XML-based languages. XML appears in fact a natural choice as the basis for the common secur...
متن کاملToward Specifying and Validating Cross-Domain Policies∗
Formal security policies are extremely useful for two related reasons. First, they allow a policy to be considered in isolation, separate from programs under the purview of the policy and separate from the implementation of the policy’s enforcement. Second, policies can be checked for compliance against higher-level security goals by using automated analyses. By contrast, ad hoc enforcement mec...
متن کاملManaging Security in Object-based Distributed Systems Using Ponder
Security management involves specification and deployment of access control policies as well as activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. The management actions to be performed when an event occurs depend on the enterprise policy. Reusable composite policy specifications are important to cater fo...
متن کاملLoPSiL: A Location-Based Policy-Specification Language
This paper describes the design of LoPSiL, a language for specifying location-dependent security and privacy policies. Policyspecification languages like LoPSiL are domain-specific programming languages intended to simplify the tasks of specifying and enforcing sound security policies on untrusted (i.e., potentially insecure) software. As far as we are aware, LoPSiL is the first imperative poli...
متن کاملSecure Programming in Klaim
In the design of programming languages for highly distributed systems where processes can migrate and execute on new hosts, the integration of security mechanisms is a major challenge. This paper describes the security mechanisms of the experimental programming language Klaim (a Kernel Language for Agents Interaction and Mobility). Klaim security architecture exploits a capability{based type sy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007