A Goal-oriented Approach to Grid Security Requirements Benjamin Aziz (STFC Rutherford Appleton Laboratory, UK) Joint work with Alvaro Arenas (STFC RAL,

Slides:



Advertisements
Similar presentations
Trust and Security for Next Generation Grids, Implementing UCON with XACML for Grid Services Bruno Crispo Vrije Universiteit Amsterdam.
Advertisements

Trust and Security for Next Generation Grids, Grid Security Requirements Philippe Massonet et al CETIC OGF-25-Presentation Catania, 02-06/03/2009.
I2S2 - Infrastructure for Integration in Structural Sciences Information Model Development Workshop RAL 11 th February 2010
Trust and Security for Next Generation Grids, Fine-grained Continuous Usage Control of Service based Grids – The GridTrust Approach Philippe.
Workpackage 2: Norms
Ontological Logic Programming by Murat Sensoy, Geeth de Mel, Wamberto Vasconcelos and Timothy J. Norman Computing Science, University of Aberdeen, UK 1.
Formalizing Security Requirements for Grids Syed Naqvi 1,2, Philippe Massonet 1, Alvaro Arenas 2 1 Centre of Excellence in Information and Communication.
LIFE CYCLE MODELS FORMAL TRANSFORMATION
ITIL: Service Transition
Presented by: Thabet Kacem Spring Outline Contributions Introduction Proposed Approach Related Work Reconception of ADLs XTEAM Tool Chain Discussion.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
July 11 th, 2005 Software Engineering with Reusable Components RiSE’s Seminars Sametinger’s book :: Chapters 16, 17 and 18 Fred Durão.
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Fundamentals of Information Systems, Second Edition
Lesson-11 Information System Development
End-to-End Design of Embedded Real-Time Systems Kang G. Shin Real-Time Computing Laboratory EECS Department The University of Michigan Ann Arbor, MI
Facilitating Decision making through Knowledge Capitalization of Maintenance Projects Management with KDD technique OLADEJO Bolanle F.(Ph.D) Department.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
Supporting Resilence in Air Traffic Management A. Tedeschi, M. Felici, V. Meduri, C. Riccucci SERENE 2008 November 17-19, 2008, Newcastle upon Tyne, UK.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Ontology Development Kenneth Baclawski Northeastern University Harvard Medical School.
Thirteenth Lecture Hour 8:30 – 9:20 am, Sunday, September 16 Software Management Disciplines Process Automation (from Part III, Chapter 12 of Royce’ book)
Working Group: Practical Policy Rainer Stotzka, Reagan Moore.
Integrated e-Infrastructure for Scientific Facilities Kerstin Kleese van Dam STFC- e-Science Centre Daresbury Laboratory
Modeling Dynamic Role- based Access Constraints using UML Khaled Alghathbar George Mason University, USA and King Saud University, Riyadh, Saudi Arabia.
UML Profile to Support Requirements Engineering with KAOS Presented by Chin-Yi Tsai.
Basel, September 2, 2008 Work Stream Templates. 2 CDISC User Group Work Streams Goals Sharing of expertise and knowledge –Sharing of useful tools (e.g.
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
A graphical specification environment for GCM component-based applications INRIA – I3S – CNRS – University of Nice-Sophia Antipolis EPC OASIS Oleksandra.
Requirement Engineering for Trust Management : Model, Methodology Reasoning P. Giorgini, F. Massacci, J. Mylopoulos, N. Zannone, “Requirements Engineering.
A new viewpoint for change management in RM-ODP systems Nesrine Yahiaoui 1,2, Bruno Traverson 1, Nicole Lévy 2 1 EDF R&D - 2 UVSQ PRiSM Workshop on ODP.
Fundamentals of Information Systems, Second Edition 1 Systems Development.
Agile SOA Agile EAI How do we achieve agility in Enterprise Integration?
Reputation Management in Grid-based Virtual Organisations Benjamin Aziz (e-Science Centre, STFC Rutherford Appleton Laboratory, UK) Joint work with Alvaro.
SCAPE Rainer Schmidt SCAPE Training Event September 16 th – 17 th, 2013 The British Library Building Scalable Environments Technologies and SCAPE Platform.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Of 33 lecture 1: introduction. of 33 the semantic web vision today’s web (1) web content – for human consumption (no structural information) people search.
1 Centre for Intelligent Systems and their Applications Division of Informatics, University of Edinburgh Draft for AKT July Workshop Jessica Chen-Burger.
International Workshop Jan 21– 24, 2012 Jacksonville, Fl USA Model-based Systems Engineering (MBSE) Initiative Slides by Henson Graves Presented by Matthew.
Trust and Security for Next Generation Grids, Securing Grid-Based Supply Chains Marco Di Girolamo HP Italy Innovation Center, Italy On.
June 13-15, 2007Policy 2007 Infrastructure-aware Autonomic Manager for Change Management H. Abdel SalamK. Maly R. MukkamalaM. Zubair Department of Computer.
Approach to building ontologies A high-level view Chris Wroe.
©MIT LKTR Workshop, Digital Archive Policies and Trusted Digital Repositories MacKenzie Smith, MIT Libraries Reagan Moore, San Diego Supercomputer.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
1 Artificial Intelligence Applications Institute Centre for Intelligent Systems and their Applications A Shared Model for Mixed-initiative Synthesis Tasks.
OWL-S: As a Semantic Mark-up Language for Grid Services By Narendranadh.J.
CERES-2012 Deliverables Architecture and system overview 21 November 2011 Updated: 12 February
Supporting education and research The JISC Core Middleware Call Brian Gilmore The University of Edinburgh and JISC Committee for Support of Research.
SEESCOASEESCOA SEESCOA Meeting Activities of LUC 9 May 2003.
1 ICAS’2008 – Gosier, March 16-21, 2008 Modeling User Interfaces to Workflow Information Systems Josefina Guerrero 1, Jean Vanderdonckt 1, Juan M. Gonzalez.
Some Thoughts to Consider 5 Take a look at some of the sophisticated toys being offered in stores, in catalogs, or in Sunday newspaper ads. Which ones.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
1 Open Session International Organization for Standardization.
Configuration Control (Aliases: change control, change management )
SECURE TROPOS Michalis Pavlidis 8 May Seminar Agenda  Secure Tropos  History and Foundation  Tropos  Basics  Secure Tropos  Concepts / Modelling.
CHESS Methodology and Tool Federico Ciccozzi MBEES Meeting Sälen, January 2011 January 2011.
Model Based Engineering Environment Christopher Delp NASA/Caltech Jet Propulsion Laboratory.
FROM THE ESSENCE OF AN ENTERPRISE TOWARDS ENTERPRISE SUPPORTING INFORMATION SYSTEMS Tanja Poletaeva Tutors: Habib Abdulrab Eduard Babkin.
Systems Development Process and Methodologies Dr. T. Ravichandran.
ITIL: Service Transition
Business process management (BPM)
Business process management (BPM)
On the use of Event-B in Modelling Data Sharing Agreements
Introduction To software engineering
CSCE 813 Internet Security Fall 2012
Security Requirements Analysis for Large-scale Distributed Systems
The JISC Core Middleware Call
Presentation transcript:

A Goal-oriented Approach to Grid Security Requirements Benjamin Aziz (STFC Rutherford Appleton Laboratory, UK) Joint work with Alvaro Arenas (STFC RAL, UK), Philippe Massonet (CETIC, Belgium) and Christophe Ponsard (CETIC, Belgium) UK e-Science All Hands Meeting (AHM 2008) W4: Information Assurance for the Grid: Crossing boundaries between stakeholders 10 September 2008, Edinburgh, U.K.

Motivation “We need more trust and security reasoning earlier in system development; at the requirement specification stage.” Analysis Requirements Specification Implementation Integration and Testing Operation and Maintenance Design Software Development Current trust and security Future trust and security

Objectives Extend a requirement engineering methodology with constructs for expressing trust relations and security policies Apply the extension to a Grid-based scenario Enhance an existing requirement engineering tool to support the new trust and security extensions

KAOS in a Nutshell KAOS (Knowledge Acquisition in autOmated Specifications) is a formal requirement engineering methodology consisting of several models including: –The Goal Model –The Operation Model –The Object Model –The Agent Model –The Anti-Goal Model Goals Requirements Operations Objects Agents Anti-Goals Anti- Requirements

Our Scenario: Grid-based Content Management (GCM) System Complex digital product VO VO has defined number of member organisations Product generation process is knowledge/content-intensive Product generation process is structured as a workflow Policies may be applied to control usage/access to resources along the workflow

The Goal/Operation Models for GCM System

The Agent/Operation/Object Models for GCM System

Trust and Security Requirements The previous models cannot express trust relations nor security policy requirements The Trust model introduces the following relations: –Ownership, Capability and Trust –Delegation –Distrust and Monitoring The Policy model introduces the policy relation

Ownership, Capability and Trust In our GCM system scenario: Trust TrustorEditor Goal[ContentReviewed] TrusteeReviewer DescriptionAgent Editor trusts Reviewer to enforce goal [ContentReviewed] ag G Owner(ag,G/Op) Op / ag G Capable(ag,G/Op) Op / G / ag1ag2 Trust(ag1,ag2,G/Op)

Delegation In our GCM system scenario: Delegation DelegatorReviewer OperationReview DelegateeAnotherReviewer PreConditionOwner(Reviewer,Review) DescriptionAgent Reviewer, owner of permission to execute operation Review, delegates such permission to agent AnotherReviewer G Op / ag1ag2 Delegation(ag1,ag2,G/Op) Owner(ag1,G/Op)

Monitoring and Distrust In our GCM system scenario: Distrust Dis-trustorReviewer OperationReview Dis-trusteeAnotherReviewer PreConditionMonitor(Reviewer,Review) DescriptionAgent Reviewer, monitoring operation Review, distrusts AnotherReviewer in its use of Review G Op / ag1ag2 Distrust(ag1,ag2,G/Op) Monitor(ag1,G/Op) ag G Monitor(ag,G/Op) Op /

Policies In our GCM system scenario: Policy SubjectReviewer OperationReview ObjectContent Formula (Reviewer,Review,Content)  ACL(Content) DescriptionAgent Reviewer, in applying operation Review to object Document, is constrained by the logical formula P Op ag Policy(ag,Op,Ob,F) Ob

Tool Support for Grid Security Requirements We are currently developing an Eclipse- based design tool for: –modelling trust requirements –deriving semi-automatically deployable policies from the Policy model: Rule-based XACML policies (ABAC) Process algebra-based policies (UCON)

Conclusion Many systems lack rigorous analysis of trust and security properties at the requirement specification stage We proposed one extension of the KAOS requirement engineering methodology to incorporate trust relations and security policies We applied the extension in the context of a Grid-based content management system

Future Work Investigate other trust and security relations, in particular, quantified trust We are planning to finish the tool development and produce a library of requirement patterns –E.g. The Chinese-walls security pattern Integrate the requirements into system design –Integrating KAOS with Event-B specification language

Thank You Questions?