Towards an algebra for security policies

  • Authors:
  • Jon Pincus;Jeannette M. Wing

  • Affiliations:
  • Microsoft Research, Redmond, WA;Computer Science Department, Carnegie Mellon University, Pittsburgh, PA

  • Venue:
  • ICATPN'05 Proceedings of the 26th international conference on Applications and Theory of Petri Nets
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Clashing security policies leads to vulnerabilities. Violating security policies leads to vulnerabilities. A system today operates in the context of a multitude of security policies, often one per application, one per process, one per user. The more security policies that have to be simultaneously satisfied, the more likely the possibility of a clash or violation, and hence the more vulnerable our system is to attack. Moreover, over time a system's security policies will change. These changes occur at small-scale time steps, e.g., using setuid to temporarily grant a process additional access rights; and at large-scale time steps, e.g., when a user changes his browser's security settings. We address the challenge of determining when a system is in a consistent state in the presence of diverse, numerous, and dynamic interacting security policies.