The Speci cation and Implementation of ` Commercial ' Security RequirementsIncluding

نویسنده

  • Simon N. Foley
چکیده

A framework for the speciication of security policies is proposed. It can used to formally specify conndentiality and integrity policies, the latter can be given in terms of Clark-Wilson style access triples. The framework extends the Clark-Wilson model in that it can be used to specify dynamic segregation of duty. For application systems where security is critical, a mul-tilevel security based approach is deened. Security policies for less critical applications can be implemented using standard Unix based systems. Both implementation strategies are based on the standard protection mechanisms that are provided by the respective systems. 1 Introduction Clark and Wilson 6] propose a model for (integrity) security that can be used for systems where security is enforced across both the operating system and the application systems. Their model is based on commercial data processing practices and can be used as a basis for evaluating the security of a complete application system. It's operating-system security requirements can be captured in terms of multilevel security (MLS), and can therefore be implemented and evaluated usingèxisting technology' 14, 18]. However, 15] argues that, whereas the Clark-Wilson model considers static segregation of duty, it does not consider the formalization of dynamic segregation of duty. In this paper, we describe a framework in which security policies, including dynamic segregation of duty, can be expressed. By expressing dynamic segregation of duty in terms of relabeling policies 11], it becomes possible to use the results in 14, 18] for implementation and evaluation of these policies. Our framework also provides a basis for policy re-nement and composition 10]. These can be used in the development of complex policies which may include combinations of integrity and conndentiality requirements spread across diierent applications. MLS systems are typically used when security is critical; a high degree of assurance is required that the security policy is upheld. For application systems that are less security critical, 16] outlines how they can be supported by a standard Unix system according to the Clark-Wilson model. We

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Of What Use is a Veri ed Compiler Speci cation ?

Program veri cation is normally performed on source code. However, it is the object code which is executed and so which ultimately must be correct. The compiler used to produce the object code must not introduce bugs. The majority of the compiler correctness literature is concerned with the veri cation of compiler speci cations rather than executable implementations. We discuss di erent ways th...

متن کامل

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Veri cation, and Implementation of Security Protocols. With AGVI, the protocol designer inpu...

متن کامل

Modeling Security - Enhanced Linux Policy Speci cations for Analysis

Security-Enhanced (SE) Linux is a modi cation of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server for enforcing policies de ned in the language. To determine whether user requests to the operating system should be granted, the security server refers to an internal form of the poli...

متن کامل

Modeling Security-Enhanced Linux Policy Specifications for Analysis

Security-Enhanced (SE) Linux is a modi cation of Linux initially released by NSA in January 2001 that provides a language for specifying Linux security policies and, as in the Flask architecture, a security server for enforcing policies de ned in the language. To determine whether user requests to the operating system should be granted, the security server refers to an internal form of the poli...

متن کامل

SoapRMI Events: Design and Implementation

This paper presents a SOAP-based [5] event system for Grid [7] events, which in turn aid in wiring together distributed software components. SOAP RPC speci es HTTP as its network protocol and XML as the data format; representation of events using XML allows self-describing formats using XML-Schemas, and language and platform independence. We de ne SOAP events as a speci cation of interfaces and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997