A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach.

Slides:



Advertisements
Similar presentations
I-ESA'08 Berlin1 Logical Foundations for the Infrastructure of the Information Market Heather, Michael, Livingstone, David, & Rossiter, Nick, CEIS, Northumbria.
Advertisements

OASIS Reference Model for Service Oriented Architecture 1.0
8.
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
Lecturer: Sebastian Coope Ashton Building, Room G.18 COMP 201 web-page: Lecture.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
The Architecture Design Process
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Ch1: File Systems and Databases Hachim Haddouti
Establishing the overall structure of a software system
Introduction to Databases Transparencies
Chapter 9 Database Design
1 / 26 CS 425/625 Software Engineering Architectural Design Based on Chapter 11 of the textbook [SE-8] Ian Sommerville, Software Engineering, 8t h Ed.,
Chapter 9 Database Design
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
9 1 Chapter 9 Database Design Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel.
Lecture Nine Database Planning, Design, and Administration
Copyright © 2007 Ramez Elmasri and Shamkant B. Navathe Slide 1- 1.
Chapter 10: Architectural Design
Security Architecture Dr. Gabriel. Security Database security: –degree to which data is fully protected from tampering or unauthorized acts –Full understanding.
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez, Jan Jurjens, Nobukazu Yoshioka, and Hironori Washizaki.
Chapter 2 Database System Concepts and Architecture
Introduction to Databases Transparencies 1. ©Pearson Education 2009 Objectives Common uses of database systems. Meaning of the term database. Meaning.
Architectural Design.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Chapter 6 System Engineering - Computer-based system - System engineering process - “Business process” engineering - Product engineering (Source: Pressman,
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 6 Slide 1 Chapter 6 Requirements Engineering Process.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Chapter 10 Architectural Design.
ITEC224 Database Programming
ITEC 3220M Using and Designing Database Systems
Security Architecture
Architectural Design portions ©Ian Sommerville 1995 Establishing the overall structure of a software system.
Database System Concepts and Architecture
1 Chapter 9 Database Design. 2 2 In this chapter, you will learn: That successful database design must reflect the information system of which the database.
Architectural Design To explain the advantages and disadvantages of different distributed systems architectures To discuss client-server and distributed.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
Architecting Web Services Unit – II – PART - III.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Architectural Design lecture 10. Topics covered Architectural design decisions System organisation Control styles Reference architectures.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 3: SOA Reference Model OASIS 2006.
Distributed Database Systems Overview
Chapter(1) Introduction and conceptual modeling. Basic definitions Data : know facts that can be recorded and have an implicit. Database: a collection.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 10Slide 1 Architectural Design l Establishing the overall structure of a software system.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
Ihr Logo Operating Systems Internals & Design Principles Fifth Edition William Stallings Chapter 2 (Part II) Operating System Overview.
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
1 What is OO Design? OO Design is a process of invention, where developers create the abstractions necessary to meet the system’s requirements OO Design.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
Chapter 2 Database System Concepts and Architecture Dr. Bernard Chen Ph.D. University of Central Arkansas.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
A Software Framework for Distributed Services Michael M. McKerns and Michael A.G. Aivazis California Institute of Technology, Pasadena, CA Introduction.
CSC480 Software Engineering Lecture 10 September 25, 2002.
1 / 26 CS 425/625 Software Engineering Architectural Design Based on Chapter 10 of the textbook [Somm00] Ian Sommerville, Software Engineering, 6 th Ed.,
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Lecture 4: Handling Heterogeneity with Information Resource Dictionary Systems Nick Rossiter, Computing Science, Newcastle University, England
AREIN, I-ESA March Higher Order Logic and Interoperability in Global Enterprise Heather, Michael, Livingstone, David, & Rossiter, Nick, CEIS, Northumbria.
1 Chapter 2 Database Environment Pearson Education © 2009.
1 Chapter 22 Distributed DBMS Concepts and Design CS 157B Edward Chen.
1 SOA Seminar Seminar on Service Oriented Architecture SOA Reference Model OASIS 2006.
Slide 1 Chapter 8 Architectural Design. Slide 2 Topics covered l System structuring l Control models l Modular decomposition l Domain-specific architectures.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Dr. Ir. Yeffry Handoko Putra
Outline Types of Databases and Database Applications Basic Definitions
Chapter 2 Database System Concepts and Architecture
Architecting Web Services
Architecting Web Services
Presentation transcript:

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach

–In modern heterogeneous interoperable systems such as Distributed Information Systems (DIS) higher-order operations are needed as same conditions applied in different systems may lead to unpredictable results –Security for Distributed Information Systems Can be achieved by securing the processes and the channels used for their interactions and by protecting the resources against unauthorized access

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach

–Security is a higher order activity, related to issues as : data integrity –enforcement of database integrity constraints –concurrency control –backup and recovery procedures, within –an overall security and access control framework interoperability –among complex heterogeneous systems –a global requirement of higher order –cannot be handled in a complete and decidable manner by axiomatic methods such as first order predicate calculus

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –Current security approaches are characterized by their locality They can be seen as first-order activities –Organizations usually respond to security threats on a piecemeal basis following hardware and software solutions inevitably leave gaps and generate inconsistencies, which can be exploited by intruders

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –Bottom-up approaches, such as risk analysis and risk management, are subjective –Top-down approaches (e.g. baseline approaches), such as ISO/IEC 27001:2005 specification and the ISO/IEC 17799:2005 Code of Practice, leave the choice of control to the user –A complete security strategy needs to be layered –A promising solution is to include security considerations as core processes of the system itself.

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –A holistic approach with natural closure seems necessary to describe a complete and global view. Based on the CIA security principles, namely confidentiality, integrity and availability Focused on securing the infrastructure itself by forcing users to adopt best security practices while ensuring that the system is “secure by design” rather than by post-rational customization

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –In the context of Distributed Information Systems A distributed computation M, e.g. a distributed transaction, is composed of a dynamic group of processes P running on different resources and sites expressed in the form of a group of communication channels W The processes P : –Have a disjoint address space –Communicate with each other by message passing via W using a variety of mechanisms, including unicast and multicast

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –Category theory provides a formal approach to process simply by the use of the arrow It is inherently holistic and with intrinsic natural closure –A category : A class, consisting of arrows between objects It provides a much greater power than functions between sets It is also of the nature of a type

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –Fundamental category theory shows that for physical existence the real world operates as a Cartesian Closed Category (that is a category of real world objects) –It has been shown in previous work that, any realizable system can be conceptually expressed using four interchangeable levels in categorical terms (Figures 2 & 3)

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach

–Adjointness characterizes the unique relationship between these Cartesian Closed Categories Interoperability is expressed in terms of the adjunction of the adjoint functors in Figure 4. Naturality is based on the ordering and interoperability of the two free and open represented category systems –From an application viewpoint, a useful view of an adjunction is that of insertion in a constrained environment The unit η can be thought of as quantitative creation, the counit ε as qualitative validation (Figure 5)

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach

–The proposed Holistic Security Framework is developed in two parallel stages In stage 1, security entities such as objects and object hierarchies are categorified into Cartesian Closed Categories. In stage 2, distributed computations, e.g distributed transactions, between processes or groups of processes (each one consisted of a series of events), can be broken up into a series of composed adjoints

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –The holistic security architecture, in categorical terms, can be visualized as mappings between pairs of adjoint functors –For example : Local extensionalities, e.g. local security policies in the form of comma categories, are interconnected one with another through global intentionality e.g. global security policy or meta-policy framework

A Holistic Security Architecture for Distributed Information Systems – A Categorical Approach –Summary Current security approaches are characterized by their locality and are based on axiomatic set theory, which offend Gödel. But, security for heterogeneous distributed information systems is based on higher order activities. The object-oriented approach, in the context of distributed information systems security, needs to be founded in applied category theory to be complete and decidable A holistic, modular security approach provides natural closure and follows the ‘process’ approach of the DIS itself