Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1655062.1655068acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Security policy refinement using data integration: a position paper

Published: 09 November 2009 Publication History

Abstract

In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of `global-as-view' database schema mappings, or to extensions thereof. We illustrate our ideas with an example.

References

[1]
A. Bandara, S. Calo, R. Craven, J. Lobo, E. Lupu, J. Ma, A. Russo, and M. Sloman. An expressive policy analysis framework with enhanced system dynamicity. TR, Department of Computing, Imperial College London, 2008.
[2]
C. Brodie, C.-M. Karat, and J. Karat. An empirical study of natural language parsing of privacy policy rules using the sparcle policy workbench. In L. F. Cranor, editor, SOUPS, volume 149 of ACM International Conference Proceeding Series, pages 8--19. ACM, 2006.
[3]
R. Craven, J. Lobo, J. Ma, A. Russo, E. Lupu, A. Bandara, S. Calo, and M. Sloman. Expressive policy analysis with enhanced system dynamicity. In ASIACCS, pages 239--250. ACM, 2009.
[4]
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In M. Sloman, J. Lobo, and E. Lupu, editors, POLICY, volume 1995 of LNCS, pages 18--38. Springer, 2001.
[5]
O. M. Duschka and M. R. Genesereth. Query planning in infomaster. In SAC, pages 109--111, 1997.
[6]
O. M. Duschka, M. R. Genesereth, and A. Y. Levy. Recursive query plans for data integration. J. Log. Program., 43(1):49--73, 2000.
[7]
A. J. I. Jones and M. J. Sergot. A formal characterisation of institutionalised power. Logic Journal of the IGPL, 4(3):427--443, 1996.
[8]
R. Kowalski and M. Sergot. A logic-based calculus of events. New Generation Computing, 4:67--95, 1986.
[9]
A. Y. Levy, A. Rajaraman, and J. J. Ordille. Querying heterogeneous information sources using source descriptions. In T. M. Vijayaraman, A. P. Buchmann, C. Mohan, and N. L. Sarda, editors, VLDB, pages 251--262. Morgan Kaufmann, 1996.
[10]
OASIS XACML TC. extensible access control markup language (XACML) v2.0, 2005.

Cited By

View all
  • (2021)Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant ArchitectureSensors10.3390/s2118605721:18(6057)Online publication date: 9-Sep-2021
  • (2013)Security Policy Alignment: A Formal ApproachIEEE Systems Journal10.1109/JSYST.2012.22219337:2(275-287)Online publication date: Jun-2013
  • (2011)Policy refinementProceedings of the 7th International Conference on Network and Services Management10.5555/2147671.2147690(115-123)Online publication date: 24-Oct-2011
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SafeConfig '09: Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
November 2009
88 pages
ISBN:9781605587783
DOI:10.1145/1655062
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authorization
  2. policies
  3. refinement
  4. security

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 22 of 61 submissions, 36%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 30 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant ArchitectureSensors10.3390/s2118605721:18(6057)Online publication date: 9-Sep-2021
  • (2013)Security Policy Alignment: A Formal ApproachIEEE Systems Journal10.1109/JSYST.2012.22219337:2(275-287)Online publication date: Jun-2013
  • (2011)Policy refinementProceedings of the 7th International Conference on Network and Services Management10.5555/2147671.2147690(115-123)Online publication date: 24-Oct-2011
  • (2011)Policy refinement of network services for MANETs12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops10.1109/INM.2011.5990681(113-120)Online publication date: May-2011
  • (2010)Decomposition techniques for policy refinement2010 International Conference on Network and Service Management10.1109/CNSM.2010.5691331(72-79)Online publication date: Oct-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media