Methods and Tools for Policy Analysis

被引:27
作者
Abu Jabal, Amani [1 ]
Davari, Maryam [1 ]
Bertino, Elisa [1 ]
Makaya, Christian [2 ]
Calo, Seraphin [2 ]
Verma, Dinesh [2 ]
Russo, Alessandra [3 ]
Williams, Christopher [4 ]
机构
[1] Purdue Univ, 305 N Univ St, W Lafayette, IN 47907 USA
[2] IBM Res, Yorktown Hts, NY USA
[3] Imperial Coll, London, England
[4] Def Sci & Technol Lab, Porton Down, England
关键词
Policy analysis; access control policies; network policies; policy quality requirements; policy design and organization; similarity analysis; change impact analysis; ACCESS-CONTROL POLICIES; DECISION DIAGRAMS; MODEL-CHECKING; VERIFICATION; FRAMEWORK; IMPACT; LOGIC; CLASSIFICATION; ARGUMENTATION; SPECIFICATION;
D O I
10.1145/3295749
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Policy-based management of computer systems, computer networks and devices is a critical technology especially for present and future systems characterized by large-scale systems with autonomous devices, such as robots and drones. Maintaining reliable policy systems requires efficient and effective analysis approaches to ensure that the policies verify critical properties, such as correctness and consistency. In this paper, we present an extensive overview of methods for policy analysis. Then, we survey policy analysis systems and frameworks that have been proposed and compare them under various dimensions. We conclude the paper by outlining novel research directions in the area of policy analysis.
引用
收藏
页数:35
相关论文
共 222 条
  • [1] A Comprehensive Query Language for Provenance Information
    Abu Jabal, Amani
    Bertino, Elisa
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2018, 27 (03)
  • [2] Abu Jabal A, 2016, P IEEE INT C E-SCI, P270, DOI 10.1109/eScience.2016.7870908
  • [3] Abu Jabal A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P131, DOI [10.1109/CIC.2016.029, 10.1109/CIC.2016.27]
  • [4] Acree Jr AT, 1980, THESIS
  • [5] Adi K, 2009, LECT NOTES BUS INF P, V26, P212
  • [6] Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
  • [7] Agrawal R., 1994, INT C VER LARG DAT B, P487
  • [8] Ahmed T., 2003, SACMAT '03, P196
  • [9] AKERS SB, 1978, IEEE T COMPUT, V27, P509, DOI 10.1109/TC.1978.1675141
  • [10] Conflict classification and analysis of distributed firewall policies
    Al-Shaer, E
    Hamed, H
    Boutaba, R
    Hasan, M
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (10) : 2069 - 2084