Verification of Security Policy Enforcement in Enterprise Systems

被引:0
|
作者
Gupta, Puneet [1 ]
Stoller, Scott D. [1 ]
机构
[1] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request's path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource.
引用
收藏
页码:202 / 213
页数:12
相关论文
共 50 条
  • [1] Formal Verification of Security Policy Implementations in Enterprise Networks
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2009, 5905 : 117 - +
  • [2] Automatic security policy enforcement in computer systems
    Adi, Kamel
    Hamza, Lamia
    Pene, Liviu
    [J]. COMPUTERS & SECURITY, 2018, 73 : 156 - 171
  • [3] Enforcement of integrated security policy in Trusted Operating Systems
    Kim, Hyung Chan
    Ramakrishna, R. S.
    Shin, Wook
    Sakurai, Kouichi
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 214 - +
  • [4] Verification of Security Policy of Service Oriented Systems
    Mana, Antonio
    Pujol, Gimena
    [J]. 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED MULTIMEDIA SYSTEMS (DMS 2010), 2010, : 120 - 125
  • [5] Policy-based security management for enterprise systems
    Mukkamala, R
    Chekuri, L
    Moharrum, M
    Palley, S
    [J]. RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
  • [6] Security Policy Verification Tool for Geographical Information Systems
    Kotenko, Igor
    Tishkov, Artem
    Chervatuk, Olga
    Sidelnikova, Ekaterina
    [J]. INFORMATION FUSION AND GEOGRAPHIC INFORMATION SYSTEMS, PROCEEDINGS, 2007, : 128 - 146
  • [7] Security policy verification for multi-domains in cloud systems
    Antonios Gouglidis
    Ioannis Mavridis
    Vincent C. Hu
    [J]. International Journal of Information Security, 2014, 13 : 97 - 111
  • [8] Security policy verification for multi-domains in cloud systems
    Gouglidis, Antonios
    Mavridis, Ioannis
    Hu, Vincent C.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 97 - 111
  • [9] A flexible architecture for security policy enforcement
    McDaniel, P
    Prakash, A
    [J]. DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
  • [10] Patterns in security enforcement policy development
    Thomsen, Dan
    [J]. DEXA 2007: 18TH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2007, : 744 - 748