Recursive policies Expressive historical conditions with constraints Fine-grained defaults Abstract language for policies at all levels of abstraction.

Slides:



Advertisements
Similar presentations
An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Advertisements

ROWLBAC – Representing Role Based Access Control in OWL
QUN NI 1, SHOUHUAI XU 2, ELISA BERTINO 1, RAVI SANDHU 2, AND WEILI HAN 3 1 PURDUE UNIVERSITY USA 2 UT SAN ANTONIO USA 3 FUDAN UNIVERSITY CHINA PRESENTED.
Annual Conference of ITA ACITA 2009 Efficient Evaluation of History-based Policies Jiefei Ma 1, Jorge Lobo 2, Alessandra Russo 1, Emil Lupu 1, Seraphin.
Efficient Evaluation of History-based Policies Imperial College London, UK IBM Watson Research, US.
Policy Specification, Analysis and Transformation International Technology Alliance in Network and Information Sciences A scenario based demo will illustrate.
Annual Conference of ITA ACITA 2009 Realising Management and Composition of Self-Managed Cells in Body Area Networks Alberto Schaeffer-Filho, Emil Lupu,
AMUSE Autonomic Management of Ubiquitous Systems for e-Health Prof. J. Sventek University of Glasgow In collaboration.
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
News in XACML 3.0 and application to the cloud Erik Rissanen, Axiomatics
June, 2006 The 11th CAiSE06 International Workshop on Exploring Modeling Methods in Systems Analysis and Design (EMMSAD06), Luxembourg Ontological.
Access Control A Meta-Model 1Dennis Kafura – CS5204 – Operating Systems.
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
Role Based Access Control Venkata Marella. Access Control System Access control is the ability to permit or deny the use of a particular resource by a.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Software Requirements
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
I.1 ii.2 iii.3 iv.4 1+1=. i.1 ii.2 iii.3 iv.4 1+1=
Role Based Access Control Models Presented By Ankit Shah 2 nd Year Master’s Student.
Complex Security Policies Dave Andersen Advanced Operating Systems Georgia State University.
Manfred Reichert, Barbara Weber, Victoria Torres Large Process Models and Process Model Collections: - Challenges, Methods, Technologies - Barbara Weber.
Multiple Input/Output Connector Shalini Agarwal Oxygen Conference January 8 th, 2002.
9.1 © 2004 Pearson Education, Inc. Lesson 9: Implementing Group Policy in Windows 2000 Server Exam Microsoft® Windows® 2000 Directory Services Infrastructure.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
المحاضرة الثالثة. Software Requirements Topics covered Functional and non-functional requirements User requirements System requirements Interface specification.
December To share best practices from the experience of 100 NSDS implemented over the last years. To take into account international community.
MITREMITRE Coalition Security Policy Language Project 11 December 2000.
Object-Oriented Modeling
Switch-and-Navigate: Controlling Data Ferry Mobility for Delay-Bounded Messages Liang Ma*, Ting He +, Ananthram Swami §, Kang-won Lee + and Kin K. Leung*
Felipe Pollola Paulo Vitor. MVC (Model-View-Controller); About TurboGears; TurboGears Installation; Creating a Project; Starting a Project; Implementing.
Module 4 Designing and Implementing Views. Module Overview Introduction to Views Creating and Managing Views Performance Considerations for Views.
Requirements Engineering Overview Senior Design Don Evans.
Safety-Critical Systems 5 Testing and V&V T
IS550: Software requirements engineering Dr. Azeddine Chikh 2. Functional and non-functional requirements.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
XML Access Control Koukis Dimitris Padeleris Pashalis.
FlexFlow: A Flexible Flow Policy Specification Framework Shipping Chen, Duminda Wijesekera and Sushil Jajodia Center for Secure Information Systems George.
IIS and.Net security -Vasudha Bhat. What is IIS? Why do we need IIS? Internet Information Services (IIS) is a Web server, its primary job is to accept.
® IBM Software Group © 2004 IBM Corporation Developing an SOA with RUP and UML 2.0 Giles Davies.
Policy Evaluation Testbed Vincent Hu Tom Karygiannis Steve Quirolgico NIST ITL PET Report May 4, 2010.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
CMSC 345 Fall 2000 Requirements Expression. How To Express Requirements Often performed best by working top- down Express general attributes of system.
A Goal-based Approach to Policy Refinement Arosha K Bandara, Emil C Lupu, Alessandra Russo Department of Computing, Imperial College London, UK Jonathan.
Banaras Hindu University. A Course on Software Reuse by Design Patterns and Frameworks.
Chapter 4 – Requirements Engineering Lecture 1 The hardest part of the software task is arriving at a complete and consistent specification, and much of.
Chapter 4 Requirements Engineering (1/3) Yonsei University 2 nd Semester, 2015 Sanghyun Park.
Service Component Architecture (SCA) Policy FrameWork V1.0 Ashok Malhotra – Oracle Anish Karmarkar – Oracle David Booz - IBM …
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Of 24 lecture 11: ontology – mediation, merging & aligning.
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
Composing semantic Web services under constraints E.Karakoc, P.Senkul Journal: Expert Systems with Applications 36 (2009)
19 Copyright © 2008, Oracle. All rights reserved. Security.
Shriram Krishnamurthi Brown University
Types and Characteristics of Requirements
File Share Parameters File share resources can be normal shares, DFS roots, or Dynamic Shares. You configure file share permissions at the same time and.
Chapter 4 Requirements Engineering (1/3)
Chapter 4 – Requirements Engineering
Chapter 5 – Requirements Engineering
SysML v2 Formalism: Requirements & Benefits
Security mechanisms and vulnerabilities in .NET
JEFFERSON CHAMBER OF COMMERCE HEALTHCARE CONFERENCE
Temporal Location-Aware Access Control Model
Chapter 5 Architectural Design.
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Access Control What’s New?
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

Recursive policies Expressive historical conditions with constraints Fine-grained defaults Abstract language for policies at all levels of abstraction Annual Conference of ITA ACITA 2009 Expressive Policy Analysis with Laws of System Change Robert Craven, Jiefei Ma, Alessandra Russo, Emil Lupu, Morris Sloman Jorge Lobo, Seraphin Calo Arosha Bandara Imperial College London IBM T.J. Watson Research Centre Open University Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive, (ii) take account of obligations and authorizations, (iii) include a dynamic system model, and (iv) give useful diagnostic information. We present a logic-based policy analysis framework which satisfies these requirements, showing how many significant policy-related properties can be analysed, and give details of an implementation. Analysis Framework Policies Domain Description Query A person cannot assist in a medical situation once he has taken part in surveying a contaminated area denied(Sub, M1, assist, T) do(Sub, M2, assist, T), T < T, holdsAt(activity_type(M1, medical), T), holdsAt(activity_type(M2, survey(A)), T), holdsAt(area_classify(A, contaminated), T). A connecting node should re-identify itself within five minutes of making a connection to a server, or the server must drop the connection within one second obl(U, serv, sub2ID(U, serv), T, T+, T+300, T+ ) holdsAt(node(U), T), do(U, serv, connect, T). obl(serv, serv, disconnect(U, serv), Te, Te+1, Te) violated(U, serv, sub2ID(U, serv), Ts, Te, Te). Event Calculus for description of policy-governed system Separable from Policy Set: analyse policies on different systems, or different policies on same system, easily holdsAt(hasRole(U,R),T) holdsAt(hasUser(R,U),T), holdsAt(subRole(R,R),T). initiates((S:R:assignUser(U)), hasUser(R,U), T). initiates((S:R:assignPerm(T,A)), hasPerm(R,T,A), T). Modality Conflicts for actions both permitted and denied, or obligations without attendant permission Detailed Trace Abduction for analysis of behaviour leading to input system and policy state Configurable Constrained Search,and Mutiple Solutions Various types of Separation of Duty analysis Coverage Gap discovery Behavioural Simulation Policy Comparison Is there ever a time at which sub is allowed to activate two roles which are separated permitted(sub, roles, activate(Role_a), T) permitted(sub, roles, activate(Role_b), T) holdsAt(separated(sub, Role_a, Role_b), T) Are there situations in which a medic has an obligation to perform some action but no permission to do it obl(Medic, Tar, Act, Ts, Te, Tinit) not cease_obl(Medic, Tar, Act, Tinit, Ts, Te, T) denied(Medic, Tar, Act, T) Ts < T holdsAt(role(medic, Medic), T) Show all actions neither permitted nor denied not permitted(Sub,Tar,Act,T) not denied(Sub,Tar,Act,T) Query Solution Use of Abductive Constraint Logic Programming for finding multiple solutions to linked policy/domain queries. Solutions specify: requests for access, governed by policies; the initial state, and history of events in the system; any policies involved; temporal constraints between these; that have been proved to lead to the property given in the query: Policies Query Solution Query Property + +