A novel logic-based automatic approach to constructing compliant security policies

被引:2
作者
Bao YiBao [1 ,2 ,4 ]
Yin LiHua [1 ]
Fang BinXing [1 ,3 ]
Guo Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing 100190, Peoples R China
[2] Informat Engn Univ, Inst Elect Technol, Zhengzhou 450004, Peoples R China
[3] Beijing Univ Posts & Telecommun, Beijing 100190, Peoples R China
[4] Chinese Acad Sci, Grad Univ, Beijing 100049, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
security policy; rewriting; logic program; compliance; VERIFICATION; LANGUAGE; SYSTEMS;
D O I
10.1007/s11432-011-4426-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is significant to automatically detect and resolve the incompliance in security policy. Most existing works in this field focus on compliance verification, and few of them provide approaches to automatically correct the incompliant security policies. This paper proposes a novel approach to automatically transform a given security policy into a compliant one. Given security policy Pi and delegation policy M declared by logic programs, the approach automatically rewrites Pi into a new one Pi(M) which is compliant with M and is readable by the humans. We prove that the algorithm is sound and complete under noninterference assumption. Formally, we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on Pi(M). The approach is automatic, so it doesn't require a administrator with excess abilities. In this sense, our proposal can help us to save much manpower resource in security management and improves the security assurance abilities.
引用
收藏
页码:149 / 164
页数:16
相关论文
共 24 条
  • [21] Contouring Accuracy Improvement of Parametric Free-form Curves. a Fuzzy logic-based Disturbance Compensation Approach
    Su, Ke-Han
    Cheng, Ming-Yang
    Chang, Yu-Chen
    2013 IEEE INTERNATIONAL CONFERENCE ON MECHATRONICS (ICM), 2013,
  • [22] An improved fuzzy logic-based small cell deployment in NOMA-HetNet: a novel sun flower-based tunicate swarm optimization-oriented multi objective concept
    Disney, D. Anu
    Merline, A.
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2023, 48 (02):
  • [23] Cyber Security within Smart Cities: A Comprehensive Study and a Novel Intrusion Detection-Based Approach
    Houichi, Mehdi
    Jaidi, Faouzi
    Bouhoula, Adel
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 81 (01): : 393 - 441
  • [24] Three Phase, 10 kVA Dual Conversion type Automatic AC Voltage Regulator- An Approach based on Fuzzy Logic Controlled Cuk Converter and PI Controlled Three Phase Inverter
    Rakshit, Saptarshi
    Maity, Jayabrata
    2018 IEEE 8TH POWER INDIA INTERNATIONAL CONFERENCE (PIICON), 2018,