Methods and limitations of security policy reconciliation

被引:22
作者
McDaniel, P
Prakash, A
机构
来源
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS | 2002年
关键词
D O I
10.1109/SECPRI.2002.1004363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A security policy is a means by which participant session requirements are specified. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. This paper considers the limits and methods of reconciliation in a general-purpose policy model. We identify an algorithm for efficient two-policy reconciliation, and show that, in the worst-case, reconciliation of three or more policies is intractable. Further, we suggest efficient heuristics for the detection and resolution of intractable reconciliation. Based upon the policy model, we describe the design and implementation of the Ismene policy language. The expressiveness of Ismene, and indirectly of our model, is demonstrated through the representation and exposition of policies supported by existing policy languages. We conclude with brief notes on the integration and enforcement of Ismene policy within the Antigone communication system.
引用
收藏
页码:73 / 87
页数:15
相关论文
共 33 条
[1]  
[Anonymous], 1998, RFC2409
[2]  
[Anonymous], 1999, KEYNOTE TRUST MANAGE
[3]  
[Anonymous], 2401 RFC INT ENG TAS
[4]  
BALENSON D, 1999, 074522 TISR TIS LABS
[5]   Firmato:: A novel firewall management toolkit [J].
Bartal, Y ;
Mayer, A ;
Nissim, K ;
Wool, A .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :17-31
[6]  
BELLOVIN S, 1999, DISTRIBUTED FIREWALL, P39
[7]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[8]  
Blaze M., 1999, Secure Internet programming. Security issues for mobile and distributed objects, P185
[9]  
BLIGHT DC, 1999, P INT NETW MAN, V6, P811
[10]  
BRANSTAD D, 2000, P DARPA INF SURV C E, P103