Middleware for User Controlled Environments
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
A lattice-based approach for updating access control policies in real-time
Information Systems
Zodiac: efficient impact analysis for storage area networks
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Using semi-formal methods for detecting interactions among smart homes policies
Science of Computer Programming
Efficient policy analysis for administrative role based access control
Proceedings of the 14th ACM conference on Computer and communications security
PoDIM: a language for high-level configuration management
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
Enabling verification and conformance testing for access control model
Proceedings of the 13th ACM symposium on Access control models and technologies
The policy continuum-Policy authoring and conflict analysis
Computer Communications
Harnessing Models for Policy Conflict Analysis
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
Stale-safe security properties for group-based secure information sharing
Proceedings of the 6th ACM workshop on Formal methods in security engineering
Policy-constrained bio-inspired processes for autonomic route management
Computer Networks: The International Journal of Computer and Telecommunications Networking
Physical interaction in pervasive computing: formal modeling, analysis and verification
Proceedings of the 2009 international conference on Pervasive services
Configuration management and security
IEEE Journal on Selected Areas in Communications - Special issue on network infrastructure configuration
A formal logic approach to firewall packet filtering analysis and generation
Artificial Intelligence Review
On harnessing information models and ontologies for policy conflict analysis
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Enforcement of integrated security policy in trusted operating systems
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Agreements and policies in cooperative mobile agents: formalization and implementation
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
A logic for state-modifying authorization policies
ACM Transactions on Information and System Security (TISSEC)
Visualization for access control policy analysis results using multi-level grids
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Verification of policy-based self-managed cell interactions using alloy
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Analysis of privacy and security policies
IBM Journal of Research and Development
Editorial: Detection of semantic conflicts in ontology and rule-based information systems
Data & Knowledge Engineering
A cautionary note about policy conflict resolution
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Policy analysis for Administrative Role-Based Access Control
Theoretical Computer Science
Security requirements model for grid data management systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Implicit context-sensitive mobile computing using semantic policies
AN'06 Proceedings of the First IFIP TC6 international conference on Autonomic Networking
Policy interoperability and network autonomics
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
An approach to understanding policy based on autonomy and voluntary cooperation
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
CLIMA'05 Proceedings of the 6th international conference on Computational Logic in Multi-Agent Systems
Transversal policy conflict detection
ESSoS'12 Proceedings of the 4th international conference on Engineering Secure Software and Systems
Specifying software features for composition: A tool-supported approach
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
As the interest in using policy-based approaches forsystems management grows, it is becoming increasinglyimportant to develop methods for performing analysisand refinement of policy specifications. Although this isan area that researchers have devoted some attention to,none of the proposed solutions address the issues ofanalysing specifications that combine authorisation andmanagement policies; analysing policy specifications thatcontain constraints on the applicability of the policies;and performing a priori analysis of the specification thatwill both detect the presence of inconsistencies andexplain the situations in which the conflict will occur.This paper presents a method for transforming bothpolicy and system behaviour specifications into a formalnotation that is based on Event Calculus. Additionally itdescribes how this formalism can be used in conjunctionwith abductive reasoning techniques to perform a priorianalysis of policy specifications for the various conflicttypes identified in the literature. Finally, it presents someinitial thoughts on how this notation and analysistechnique could be used to perform policy refinement.