Download presentation
Presentation is loading. Please wait.
Published bySuryadi Lie Modified over 6 years ago
1
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II September 23, 2009
2
Outline Security Constraint Processing Use of Conceptual Structures
3
Security Constraint Processing
Security Constraints are rules that assign security levels to the data MLS/DBMS is augmented with an Inference Engine Inference Engine is the Inference Controller Integrated Architecture for Security Constraint processing Query, Update and Database design operations
4
Inference Engine Approach
5
Constraint Generation
6
Query Processor
7
Update Processor
8
Database Design Tool
9
Integrated Architecture
10
Release Control Management
11
Use of Conceptual Structures
Use conceptual structures to model the application E.g., semantic data models, semantic nets, conceptual graphs, etc. Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur
12
Multilevel Semantic Nets
13
Complex Multilevel Semantic Net
Italy Destination 20 years India Mediterranean Sea Skills Location REAGAN Smith Captain Date 16 June 2000 Skills Carries SUN Explosive Battle Passengers Management Type
14
ISA/AKO Links
15
Example Rules - II SHIPS WEAPONS (a) SHIP WATER VEHICLE AKO (c) REAGAN
ISA (b) PERSON Has Captain
16
Example Rules - II SHIPS WEAPONS (d) REAGAN SHIP ISA PERSON
Has Captain (e) India Destination COUNTRY
17
Applying Transfer Rules
India Destination Mediterranean India Sea Mediterranean Sea (b) Location Location REAGAN REAGAN Smith (a) Carries Carries Skills Type SUN Type Explosive SUN Explosive Battle Management Destination India Mediterranean Sea Location Smith REAGAN (c) Combines (a) and (b) Skills Carries Battle Type SUN Management Explosive
18
Security Constraints Carries Carries REAGAN REAGAN SHIPS SHIPS WEAPONS
SUN SUN WEAPONS (a) (a) Mediterranean Mediterranean Location Carries Carries REAGAN REAGAN SHIPS SHIPS SUN SUN (b) (b) Destination Destination COUNTRY COUNTRY
19
Security Constraint Violation - I
20
Security Constraint Violation - II
21
Universal and Existential Conditionals
22
Matching Vectors
23
Matching and Binding India Destination Location Mediterranean
SHIP: ALL X (a) Destination Carries New Delhi India Mediterranean Explosive Sea WEAPONS: SOME Y Capital Capital Destination Type Location REAGAN Smith Captain New Delhi India (b) FLORIDA FLORIDA Mediterranean Skills Sea Capital Destination Carries Carries Carries Location Battle REAGAN Management SUN Explosive MOON MOON Smith Captain Type Type Type Skills FLORIDA Carries (c ) Results from (a) and (b) (c ) Results from (a) and (b) Carries Battle Management SUN Explosive MOON Type Type
24
Negative Statements
25
X X Refutation LOCATION REAGAN SHIPS FLORIDA SHIPS WEAPONS
Pacific Ocean WEAPONS REAGAN DESTINATION (a) DESTINATION (b) Australia Australia WEAPONS WEAPONS FLORIDA FLORIDA DESTINATION SHIPS SHIPS WEAPONS REAGAN WEAPONS REAGAN REAGAN SHIPS Australia WEAPONS LOCATION DESTINATION X X (c ) Pacific Ocean Pacific Ocean Australia Australia WEAPONS WEAPONS (d) FLORIDA SHIPS REAGAN WEAPONS DESTINATION LOCATION Australia Pacific Ocean WEAPONS (e) WEAPONS
26
Directions Inference problem is still being investigated
Census bureau still working on statistical databases Need to find real world examples in the Military world Inference problem with respect to medial records Much of the focus is now on the Privacy problem Privacy problem can be regarded to be a special case of the inference problem
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.