Security policy refinement using data integration: a position paper

  • Authors:
  • Robert Craven;Jorge Lobo;Emil Lupu;Alessandra Russo;Morris Sloman

  • Affiliations:
  • Imperial College London, London, United Kingdom;IBM T.J. Watson Research Center, Yorktown Heights, USA;Imperial College London, London, United Kingdom;Imperial College London, London, United Kingdom;Imperial College London, London, United Kingdom

  • Venue:
  • Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

In spite of the wide adoption of policy-based approaches for security management, and many existing treatments of policy verification and analysis, relatively little attention has been paid to policy refinement: the problem of deriving lower-level, runnable policies from higher-level policies, policy goals, and specifications. In this paper we present our initial ideas on this task, using and adapting concepts from data integration. We take a view of policies as governing the performance of an action on a target by a subject, possibly with certain conditions. Transformation rules are applied to these components of a policy in a structured way, in order to translate the policy into more refined terms; the transformation rules we use are similar to those of `global-as-view' database schema mappings, or to extensions thereof. We illustrate our ideas with an example.