A novel logic-based automatic approach to constructing compliant security policies

被引:0
作者
YiBao Bao
LiHua Yin
BinXing Fang
Li Guo
机构
[1] Chinese Academy of Sciences,Institute of Computing Technology
[2] Information Engineering University,Institute of Electronic Technology
[3] Beijing University of Posts and Telecommunications,undefined
[4] Graduate University,undefined
[5] the Chinese Academy of Science,undefined
来源
Science China Information Sciences | 2012年 / 55卷
关键词
security policy; rewriting; logic program; compliance;
D O I
暂无
中图分类号
学科分类号
摘要
It is significant to automatically detect and resolve the incompliance in security policy. Most existing works in this field focus on compliance verification, and few of them provide approaches to automatically correct the incompliant security policies. This paper proposes a novel approach to automatically transform a given security policy into a compliant one. Given security policy Π and delegation policyM declared by logic programs, the approach automatically rewrites Π into a new one ΠM which is compliant with M and is readable by the humans. We prove that the algorithm is sound and complete under noninterference assumption. Formally, we show that the security policy query evaluation algorithm with conflict and unsettlement resolution still works very well on ΠM. The approach is automatic, so it doesn’t require a administrator with excess abilities. In this sense, our proposal can help us to save much manpower resource in security management and improves the security assurance abilities.
引用
收藏
页码:149 / 164
页数:15
相关论文
共 21 条
[1]  
Sandhu R.(1996)Role-based access control models IEEE Comput 29 38-47
[2]  
Coyne E. J.(2000)Enforceable security policies ACM Trans Inform Syst Secur 3 30-50
[3]  
Feinstein H. L.(1976)Protection in operating systems Commun ACM 19 461-471
[4]  
Schneider F. B.(1989)Software verification and validation: an overview IEEE Software 6 10-17
[5]  
Harrison M. A.(1986)Automatic verification of finite-state concurrent systems using temporal logic specifications ACM Trans Progr Lang Sys 8 244-295
[6]  
Ruzzo W. L.(1997)The model checker SPIN IEEE Trans Software Eng 23 279-136
[7]  
Ullman J. D.(1993)Authorizations in distributed systems: a new approach J Comput Secur 2 107-260
[8]  
Wallace D. R.(2001)Flexible support for multiple access control policies ACM Trans Database Syst 26 214-649
[9]  
Fujii R. U.(1991)The well-founded semantics for general logic programs J ACM 38 619-undefined
[10]  
Clarke E. M.(undefined)undefined undefined undefined undefined-undefined