A Graph-based Language for Specifying Security Policies

نویسندگان

  • James A. Hoagland
  • Raju Pandey
  • Karl N. Levitt
چکیده

A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, and (3) other formal operations on policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy and a system description are independently specified. LaSCO policies are specified as expressions in a quantifier-free logic, but also, to provide visualization, as directed graphs. Formal semantics have been defined. LaSCO can be used for policy requirements that conform to its very general object-based system model. The implementation of LaSCO is in Java, and automatically generates wrappers to check Java program executions with respect to a policy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

XML-Based Access Control Languages

One of the most challenging problems in managing large, distributed, and heterogeneous networked systems is specifying and enforcing security policies regulating interactions between parties and access to services and resources. Recent proposals for specifying and exchanging access control policies adopt XML-based languages. XML appears in fact a natural choice as the basis for the common secur...

متن کامل

Toward Specifying and Validating Cross-Domain Policies∗

Formal security policies are extremely useful for two related reasons. First, they allow a policy to be considered in isolation, separate from programs under the purview of the policy and separate from the implementation of the policy’s enforcement. Second, policies can be checked for compliance against higher-level security goals by using automated analyses. By contrast, ad hoc enforcement mec...

متن کامل

Managing Security in Object-based Distributed Systems Using Ponder

Security management involves specification and deployment of access control policies as well as activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. The management actions to be performed when an event occurs depend on the enterprise policy. Reusable composite policy specifications are important to cater fo...

متن کامل

LoPSiL: A Location-Based Policy-Specification Language

This paper describes the design of LoPSiL, a language for specifying location-dependent security and privacy policies. Policyspecification languages like LoPSiL are domain-specific programming languages intended to simplify the tasks of specifying and enforcing sound security policies on untrusted (i.e., potentially insecure) software. As far as we are aware, LoPSiL is the first imperative poli...

متن کامل

Secure Programming in Klaim

In the design of programming languages for highly distributed systems where processes can migrate and execute on new hosts, the integration of security mechanisms is a major challenge. This paper describes the security mechanisms of the experimental programming language Klaim (a Kernel Language for Agents Interaction and Mobility). Klaim security architecture exploits a capability{based type sy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007