Security Policy Alignment: A Formal Approach

被引:14
|
作者
Pieters, Wolter [1 ]
Dimkov, Trajce [2 ]
Pavlovic, Dusko [3 ,4 ]
机构
[1] Delft Univ Technol, Fac Technol Policy & Management, Energy & Ind Grp, NL-2600 Delft, Netherlands
[2] Deloitte, Secur & Privacy Grp, NL-1183 Amstelveen, Netherlands
[3] Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
[4] Univ Twente, Fac Elect Engn Math & Comp Sci, Distributed & Embedded Secur Grp, NL-7500 Enschede, Netherlands
来源
IEEE SYSTEMS JOURNAL | 2013年 / 7卷 / 02期
关键词
Attack trees; security logics; security policies; security policy alignment; security policy refinement; socio-technical systems; system models; ATTACK; FOUNDATIONS;
D O I
10.1109/JSYST.2012.2221933
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks, firewalls and employee behavior, and this refinement should be correct with respect to the original policy. Although alignment of security policies in socio-technical systems has been discussed in the literature, especially in relation to business goals, there has been no formal treatment of this topic so far in terms of consistency and completeness of policies. Wherever formal approaches are used in policy alignment, these are applied to well-defined technical access control scenarios instead. Therefore, we aim at formalizing security policy alignment for complex socio-technical systems in this paper, and our formalization is based on predicates over sequences of actions. We discuss how this formalization provides the foundations for existing and future methods for finding security weaknesses induced by misalignment of policies in socio-technical systems.
引用
收藏
页码:275 / 287
页数:13
相关论文
共 50 条
  • [1] A formal approach to specify and deploy a network security policy
    Cuppens, F
    Cuppens-Boulahia, N
    Sans, T
    Miège, A
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 203 - 218
  • [2] A Formal Approach for Network Security Policy Relevancy Checking
    Ben Ftima, Fakher
    Karoui, Kamel
    Ben Ghezala, Henda
    [J]. NETWORK AND SYSTEM SECURITY, 2017, 10394 : 555 - 564
  • [3] A formal model of Healthcare Security Policy
    Cohen, B
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B181 - B196
  • [4] A FORMAL APPROACH TO SECURITY ARCHITECTURES
    RUEPPEL, RA
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 385 - 398
  • [5] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    [J]. COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270
  • [6] FORMAL APPROACH TO AGRICULTURAL POLICY
    JOSLING, T
    WEIGHTMAN, PWH
    CAPSTICK, CW
    COLMAN, D
    ROGERS, SJ
    MARTIN, A
    HOUSTON, G
    VAUGHAN, HJ
    CRACKNELL, BE
    CHURCHER, EH
    MCCLEMENTS, LD
    [J]. JOURNAL OF AGRICULTURAL ECONOMICS, 1969, 20 (02) : 175 - 195
  • [7] A Formal Approach for Testing Security Rules
    Mallouli, Wissam
    Orset, Jean-Marie
    Cavalli, Ana
    Cuppens, Nora
    Cuppens, Frederic
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 127 - 132
  • [8] A Formal Approach to Information Security Metrics
    Chakraborty, Agniswar
    Sengupta, Anirban
    Mazumdar, Chandan
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2012, : 439 - 442
  • [9] Formal verification of security properties in trust management policy
    Niu, Jianwei
    Reith, Mark
    Winsborough, William
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (01) : 69 - 153
  • [10] Formal Verification of Finite State Transactional Security Policy
    Rajamanickam, N.
    Nadarajan, R.
    Elci, Atilla
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 363 - 376