Specifying and enforcing high-level semantic obligation policies

被引:5
|
作者
Liu, Zhen [1 ]
Ranganathan, Anand [1 ]
Riabov, Anton [1 ]
机构
[1] IBM TJ Watson Res Ctr, 19 Skyline Dr, Hawthorne, NY 10532 USA
关键词
D O I
10.1109/POLICY.2007.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Obligation Policies specify management actions that must be performed when a particular kind of event occurs and certain conditions are satisfied. Large scale distributed systems often produce event streams containing large volumes of low-level events. In many cases, these streams also contain multimedia data (consisting of text, audio or video). Hence, a key challenge is to allow policy writers to specify obligation policies based on high-level events, that may be derived after performing appropriate processing on raw, low-level events. In this paper we propose a semantic obligation policy specification language called Eagle, which is based on patterns of high-level events, represented as RDF graph patterns. Our policy enforcement architecture uses a compiler that builds a workflow for producing a stream of events, which match the high-level event pattern specified in a policy. This workflow consists of a number of event sources and event processing components, which are described semantically. We present the policy language and enforcement architecture in this paper.
引用
收藏
页码:119 / +
页数:2
相关论文
共 50 条
  • [1] Specifying and enforcing high-level semantic obligation policies
    Liu, Zhen
    Ranganathan, Anand
    Riabov, Anton
    [J]. JOURNAL OF WEB SEMANTICS, 2009, 7 (01): : 28 - 39
  • [2] Enforcing high-level security policies for Internet of Things
    ChangJin Koo
    JeongYeon Kim
    [J]. The Journal of Supercomputing, 2018, 74 : 4497 - 4505
  • [3] Enforcing high-level security policies for Internet of Things
    Koo, ChangJin
    Kim, JeongYeon
    [J]. JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4497 - 4505
  • [4] Specifying and enforcing application-level Web security policies
    Scott, D
    Sharp, R
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) : 771 - 783
  • [5] Beyond separation of duty: An algebra for specifying high-level security policies
    Li, Ninghui
    Wang, Qihua
    [J]. JOURNAL OF THE ACM, 2008, 55 (03)
  • [6] CDL: A LANGUAGE FOR SPECIFYING HIGH-LEVEL CROSS-DOMAIN SECURITY POLICIES
    Thomas, Roshan
    Tsang, Simon
    [J]. 2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 1154 - 1160
  • [7] Enforcing Architectural Contracts in High-Level Synthesis
    Patil, Nikhil
    Bansal, Ankit
    Chiou, Derek
    [J]. PROCEEDINGS OF THE 48TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2011, : 824 - 829
  • [8] Enforcing high-level security properties for applets
    Pavlova, M
    Barthe, G
    Burdy, L
    Huisman, M
    Lanet, JL
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS VI, 2004, 153 : 1 - 16
  • [9] Enforcing high-level protocols in low-level software
    DeLine, R
    Fähndrich, M
    [J]. ACM SIGPLAN NOTICES, 2001, 36 (05) : 59 - 69
  • [10] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297