A novel logic-based automatic approach to constructing compliant security policies

被引:2
|
作者
Bao YiBao [1 ,2 ,4 ]
Yin LiHua [1 ]
Fang BinXing [1 ,3 ]
Guo Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Informat Engn Univ, Inst Elect Technol, Zhengzhou 450004, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100190, Peoples R China
[4] Chinese Acad Sci, Grad Univ, Beijing 100049, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
security policy; rewriting; logic program; compliance; VERIFICATION; LANGUAGE; SYSTEMS;
D O I
10.1007/s11432-011-4426-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is significant to automatically detect and resolve the incompliance in security policy. Most existing works in this field focus on compliance verification, and few of them provide approaches to automatically correct the incompliant security policies. This paper proposes a novel approach to automatically transform a given security policy into a compliant one. Given security policy Pi and delegation policy M declared by logic programs, the approach automatically rewrites Pi into a new one Pi(M) which is compliant with M and is readable by the humans. We prove that the algorithm is sound and complete under noninterference assumption. Formally, we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on Pi(M). The approach is automatic, so it doesn't require a administrator with excess abilities. In this sense, our proposal can help us to save much manpower resource in security management and improves the security assurance abilities.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 50 条
  • [21] A Fuzzy Logic-Based Modeling Method of Deciding Maintenance Policies
    周炳海
    刘晓斌
    Journal of Donghua University(English Edition), 2011, 28 (03) : 248 - 251
  • [22] A logic-based approach to semantic information extraction
    Ruffolo, Massimo
    Manna, Marco
    ICEIS 2006: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2006, : 115 - 123
  • [23] LOGIC-BASED APPROACH TO EXPERT SYSTEMS IN CHEMISTRY
    AKUTSU, T
    SUZUKI, E
    OHSUGA, S
    KNOWLEDGE-BASED SYSTEMS, 1991, 4 (02) : 103 - 116
  • [24] A logic-based approach to program flow analysis
    Mooly Sagiv
    Nissim Francez
    Michael Rodeh
    Reinhard Wilhelm
    Acta Informatica, 1998, 35 : 457 - 504
  • [25] A logic-based approach for matching user profiles
    Calì, A
    Calvanese, D
    Colucci, S
    Di Noia, T
    Donini, FM
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2004, 3215 : 187 - 195
  • [26] A logic-based approach to program flow analysis
    Sagiv, M
    Francez, N
    Rodeh, M
    Wilhelm, R
    ACTA INFORMATICA, 1998, 35 (06) : 457 - 504
  • [27] A logic-based approach to combinatorial testing with constraints
    Calvagna, Andrea
    Gargantini, Angelo
    TESTS AND PROOFS, 2008, 4966 : 66 - +
  • [28] Logic-based approach for enforcing access control
    Bertino, Elisa
    Buccafurri, Francesco
    Ferrari, Elena
    Rullo, Pasquale
    Journal of Computer Security, 2000, 8 (02) : 109 - 139
  • [29] Optimize revamp projects with a logic-based approach
    Golden, S
    Moore, J
    Nigg, J
    HYDROCARBON PROCESSING, 2003, 82 (09): : 75 - 83
  • [30] LOGIC-BASED APPROACH TO SEMANTIC QUERY OPTIMIZATION
    CHAKRAVARTHY, US
    GRANT, J
    MINKER, J
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1990, 15 (02): : 162 - 207