A novel logic-based automatic approach to constructing compliant security policies

被引:2
|
作者
Bao YiBao [1 ,2 ,4 ]
Yin LiHua [1 ]
Fang BinXing [1 ,3 ]
Guo Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Informat Engn Univ, Inst Elect Technol, Zhengzhou 450004, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100190, Peoples R China
[4] Chinese Acad Sci, Grad Univ, Beijing 100049, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
security policy; rewriting; logic program; compliance; VERIFICATION; LANGUAGE; SYSTEMS;
D O I
10.1007/s11432-011-4426-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is significant to automatically detect and resolve the incompliance in security policy. Most existing works in this field focus on compliance verification, and few of them provide approaches to automatically correct the incompliant security policies. This paper proposes a novel approach to automatically transform a given security policy into a compliant one. Given security policy Pi and delegation policy M declared by logic programs, the approach automatically rewrites Pi into a new one Pi(M) which is compliant with M and is readable by the humans. We prove that the algorithm is sound and complete under noninterference assumption. Formally, we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on Pi(M). The approach is automatic, so it doesn't require a administrator with excess abilities. In this sense, our proposal can help us to save much manpower resource in security management and improves the security assurance abilities.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 50 条
  • [31] Distributed access control: A logic-based approach
    Barker, S
    COMPUTER NETWORK SECURITY, 2003, 2776 : 217 - 228
  • [32] A Logic-Based Incremental Approach to Graph Repair
    Schneider, Sven
    Lambers, Leen
    Orejas, Fernando
    FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING (FASE 2019), 2019, 11424 : 151 - 167
  • [33] A logic-based approach to mining inductive databases
    Liu, Hong-Cheu
    Yu, Jeffrey Xu
    Zeleznikow, John
    Guan, Ying
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 270 - 277
  • [34] Description logic-based automatic generation of geometric tolerance zones
    Qin, Yuchu
    Lu, Wenlong
    Liu, Xiaojun
    Huang, Meifa
    Zhou, Liping
    Jiang, Xiangqian
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2015, 79 (5-8): : 1221 - 1237
  • [35] SUBJECTIVE LOGIC-BASED FRAMEWORK FOR THE EVALUATION OF WEB SERVICES' SECURITY
    Juszczyszyn, Krzysztof
    COMPUTATIONAL INTELLIGENCE: FOUNDATIONS AND APPLICATIONS: PROCEEDINGS OF THE 9TH INTERNATIONAL FLINS CONFERENCE, 2010, 4 : 838 - 843
  • [36] Logic-Based Security Architecture for Systems Providing Multihop Communication
    Almomani, Iman
    Al-Banna, Eman
    AL-Akhras, Mousa
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
  • [37] A logic-based framework for the security analysis of Industrial Control Systems
    Lemaire L.
    Vossaert J.
    Jansen J.
    Naessens V.
    Automatic Control and Computer Sciences, 2017, 51 (2) : 114 - 123
  • [38] Description logic-based automatic generation of geometric tolerance zones
    Yuchu Qin
    Wenlong Lu
    Xiaojun Liu
    Meifa Huang
    Liping Zhou
    Xiangqian Jiang
    The International Journal of Advanced Manufacturing Technology, 2015, 79 : 1221 - 1237
  • [39] A fuzzy logic-based automatic parallel parking control scheme
    Zhang, Fang, 1600, SAE-China (36):
  • [40] A Fuzzy Logic-based Information Security Control Assessment for Organizations
    Otero, Angel R.
    Tejay, Gurvirender
    Otero, Luis Daniel
    Ruiz-Torres, Alex J.
    2012 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS 2012), 2012, : 190 - 195