Matching Security Policies to Application
نویسنده
چکیده
The issue of developing complex secure systems is still a great challenge. We claim that in contrast to the well known bottom-up oriented approaches secure concurrent systems should be developed top-down starting with a formal top-level speciication. A framework for developing secure systems is needed, which ooers means to specify security requirements adapted to the speciic demands of application areas. In addition, an appropriate security model is needed to formally describe the behavior and the security properties of systems. We will present a uniform framework which is appropriate to match security policies to application needs. Secure concurrent systems are modeled with two diierent levels of abstraction. The action model provides a sound and ne-grained basis to formalize security properties of the system. In order to ease system modeling we introduce the object security model by systematically coarsening the action model. In addition to our security model we will present a security requirement logic. Security policies tailored to the speciic requirements of applications may by speciied with the formulas of the logic. The security requirement logic allows to specify diierent security policies such as access control and information ow policies in a uniform way, and allows to compare these policies.
منابع مشابه
Aligning ABAC Policies with Information Security Policies using Controlled Vocabulary
Attribute-based Access Control (ABAC) policies are based on mutually processable policy attributes. Assigned permissions in such policies need to be reflected or combined with organisational constraints. Best practice in information security dictates having the operational need to access a particular information artifact independent from the function of the specific application systems. Consequ...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملSemantic Matching of Web Service Policies
In this work, we present a novel approach for matching the nonfunctional properties of Web Services represented using WS-policy. To date, most policy matching has been done using syntactic approaches, where pairs of policies are compared for structural and syntactic similarity to determine compatibility. In our approach, we enhance the policies of a Web Service with semantics by creating the po...
متن کاملSemantic Matching of Security Policies to Support Security Experts
Management of security policies has become increasingly difficult given the number of domains to manage, taken into consideration their extent and their complexity. Security experts has to deal with a variety of frameworks and specification languages used in different domains that may belong to any Cloud Computing or Distributed Systems. This wealth of frameworks and languages make the manageme...
متن کاملantitative Network Monitoring with NetQRE
In network management today, dynamic updates are required for tra c engineering and for timely response to security threats. Decisions for such updates are based on monitoring network tra c to compute numerical quantities based on a variety of network and application-level performance metrics. Today’s state-of-the-art tools lack programming abstractions that capture application or session-layer...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995