Handling inheritance violation for secure interoperation of heterogeneous systems

  • Authors:
  • Hejiao Huang;Helene Kirchner;Songyun Liu;Weili Wu

  • Affiliations:
  • Harbin Institute of Technology, Shenzhen Graduate School, China.;INRIA Bordeaux Sud-Ouest, France.;Harbin Institute of Technology, Shenzhen Graduate School, China.;Department of Computer Science, University of Texas at Dellas, USA

  • Venue:
  • International Journal of Security and Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In multiple heterogeneous systems, one of key challenges of integrating policies is the conflict detection and resolution while preserving individual policy consistency. In this paper, the inheritance hierarchy of a security policy is formulated with a directed graph. Solving Inheritance Violation Problem (IVP) is formulated as a feedback arc set problem, which is NP-hard. Then some classical approximation algorithms are introduced. The IVP in two interoperating domains is converted into the problem of finding a minimum weight vertex cover problem in a bipartite graph, which is polynomial-time solvable.