VALIDATION OF INTEGRATED POLICY USING ALLOY Manachai Toahchoodee

Slides:



Advertisements
Similar presentations
Project Wisdom Working with Others for a Common Goal.
Advertisements

HELP Water Law and Policy Dr. Patricia Wouters Director, Water Law and Policy Programme University of Dundee, Scotland Member of HELP Task Force.
 "Security and Privacy in Complex Information Systems“ ◦The TC will study all aspects related to ensuring security, privacy, and availability in complex.
What type of support is available to meet our school-community integration goals and improve student outcomes?
A P RESENTATION O N R ESOURCE D ISCOVERY I N T HE P EER- T O- P EER N ETWORK by Aravind Renganathan.
September 10, 2012Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
1/03/09 De 89 à 98. 1/03/09 De 89 à 98 1/03/09 De 89 à 98.
Supporting Organisations Through CHANGE. Who are we……..  Over 25 years experience in industry – Management, L&D, OE  Track record of achieving results.
Dynamic Service Composition with QoS Assurance Feb , 2009 Jing Dong UTD Farokh Bastani UTD I-Ling Yen UTD.
PP 7.1 THE ROLE OF BASIN PLANNERS. The Roles of Basin planners Basin planners have three main roles:  Bringing together knowledge  Identifying stakeholders;
© Siemens AG, CT IC 3, Dr. David von Oheimb, AVANTSSAR FP ICT-1, ICT-1.1.4, Strep project no
Chess Review May 11, 2005 Berkeley, CA Composable Code Generation for Distributed Giotto Tom Henzinger Christoph Kirsch Slobodan Matic.
Using UML and Alloy to Specify and Analyze Access Control Features Eunjee Song, Xi Hua SP05-CS681 Project Proposal.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Research interest: Secure database outsourcing Presented by Alla Lanovenko Thesis Adviser: Professor Huiping Guo 599 A 11 December 2006.
Sai-innovations.com. Why we care about IA Review of Information Management statistics published by Gartner shows  Information is doubling every 2 years.
Managing key hierarchies for access control enforcement: Heuristic approaches Author: Carlo Blundo, Stelvio Cimato, Sabrina De Capitani di Vimercati, Alfredo.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
Computer Science and Engineering 1 XML, RDF, Workflow Security.
Web Policy Zeitgeist Panel SWPW 2005 – Galway, Ireland Piero Bonatti, November 7th, 2005.
Functions of a Database Management System
IT Governance
Ævol : A Tool for Planning Architecture Evolution David Garlan & Bradley Schmerl Carnegie Mellon University.
Motivation.  Strategy of Success #1 Transform Procrastination into Action.
An Algebra for Composing Access Control Policies (2002) Author: PIERO BONATTI, SABRINA DE CAPITANI DI, PIERANGELA SAMARATI Presenter: Siqing Du Date:
7 is a prime number Factors of 7: 1, 7 Patterns and Algebra 32 Multiplication and Division 28.
Copyright 2014 Open Networking User Group. All Rights Reserved Confidential Not For Distribution Six Steps To A Common Open Networking Ecosystem Common.
Protection of outsourced data MARIA ANGEL MARQUEZ ANDRADE.
S. Shumilov – Zürich Analytical Visualization Framework - a visual data processing and knowledge discovery system Ivan Denisovich, Serge Shumilov Department.
Introduction to the Security Forum Jet Propulsion Laboratory California Institute of Technology 4800 Oak Grove Drive Pasadena, California J.
Effective Partnerships: Focus on Results. Effective Partnerships OBJECTIVE 4-H and military partners will be able to assess and align their services to.
Data Leakage Detection by R.Kartheek Reddy 09C31D5807 (M.Tech CSE)
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
Towards A QoS Modeling and Modularization Framework for Component-based Systems Sumant Tambe* Akshay Dabholkar Aniruddha Gokhale Amogh Kavimandan (Presenter)
Copyright © 2014 by The University of Kansas Using Community Sectors to Reach Targets and Agents of Change.
A Comparison of Commercial and Military Computer Security Presenter: Ivy Jiang1 A Comparison of Commercial and Military Computer Security Policies Authors:
1 Australian Government Policy Website Accessibility OZeWAI 1 December 2004 LaTrobe University, Melbourne Jacqui Begbie, Strategic Directions & Analysis,
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Chapter 5 Population Health Quality and Safety Learning Objectives 1. Explain why it is difficult to monitor healthcare quality and safety at the population.
Ray Major June 26, 2013 The Hershey Company – Certification and Sustainability.
Sean Pander Manager, Green Building Program City of Vancouver Vancouver’s Evolving Integration of Renewable District Energy Systems and Green Building.
MIS Project Management Instructor: Sihem Smida Project Man agent 3Future Managers1.
。 33 投资环境 3 开阔视野 提升竞争力 。 3 嘉峪关市概况 。 3 。 3 嘉峪关是一座新兴的工业旅游城市,因关得名,因企设市,是长城文化与丝路文化交 汇点,是全国唯一一座以长城关隘命名的城市。嘉峪关关城位于祁连山、黑山之间。 1965 年建市,下辖雄关区、镜铁区、长城区, 全市总面积 2935.
ANALYSIS OF TRUST METRICS IN VARIOUS ANONYMITY NETWORKS -AYUSHI JAIN & ANKUR SACHDEVA.
CAN EFFECTIVE PERFORMANCE MANAGEMENT SYSTEM ALONE HELPS IMPROVE SERVICE DELIVERY? Institute of Municipal Finance Officers & Related Professions Cherèl.
Intro to Industrial Technology Unit # 1 INTRODUCTION TO TECHNOLOGY Chapter 2 Notes.
Piero Belforte 1995: CSELT THRIS SLIDES
Piero Belforte, CSELT 1995: THRIS flyer
Piero Belforte, CSELT June 1995: THRIS SLIDES.
Notes Over 1.2.
Project Human Resource Management
Review Problems Algebra 1 11-R.
EFFICIENCY/EFFECTIVENESS FRAME WORK
Discussion of Challenges & Opportunities Brainstorming Stacy Kowalczyk
Cloud Helps Schools Get Needed Tools
Controlling risks, solving problems and managing compliance
Understanding Cisco TrustSec (Secure Group Access)
Theme 1: Strengthening of local community structures
NAAS 2.0 Features and Enhancements
Using Community Sectors to Reach Targets and Agents of Change
E-government Working Group
Teacher Voice Represented in District Level Decision Making
June 22 – 25, 2017 National Conference Center • Leesburg, VA
Presented By: Darlene Banta
DMCS Data Ethics Framework principles
Data for Fisheries Management
INLIFE Incubate a New Learning and Inspiration Framework for Education
Algebra with Fractions 2
Presentation transcript:

VALIDATION OF INTEGRATED POLICY USING ALLOY Manachai Toahchoodee

Motivation Various security policies operating together in the same system Integration of policies might need to achieve the desired security requirements Tool is required to model and validate the integrated policyBackground

Our Approach Transform integrated policy to the form of algebra [Bonatti, Vimercati, Samarati] Model the transformed policy using Alloy Validate policy using Alloy analyzer tool

Benefits Ensure the validity of integrated policy Simplify the policy Automatically validate Make the policy comply with the requirement

References (1) François Siewe, Antonio Cau, Hussein Zedan, “A compositional framework for access control policies enforcement” Piero Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati, “An algebra for composing access control policies” Piero Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati, “ A modular approach to composing access control policies ”

References (2) Hilary H. Hosmer, “ The multipolicy paradigm for trusted systems ”