Towards System Integrity Protection with Graph-Based Policy Analysis
نویسندگان
چکیده
Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to the high complexity of policy configurations in contemporary systems. In this paper, we present a graph-based policy analysis methodology to identify TCBs with the consideration of different system applications and services. Through identifying information flows violating the integrity protection of TCBs, we also propose resolving principles to using our developed graph-based policy analysis tool.
منابع مشابه
Towards a measure of vulnerability, tenacity of a Graph
If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...
متن کاملAn analysis of factors affecting on customers’ adoption of internet-banking services using the graph theory
The rapid development of Internet and electronic businesses have stimulated the banking sector towards encouraging customers to internet banking (IB), However, the evidence indicates a lack of interest in the use of IB services. Therefore, this paper aims to identify affecting factors on customer adoption from IB and measure the influence of each factor on IB adoption. Based on an explorative l...
متن کاملModernizing the Legal Criminal Policy towards the Electronic Tax System
The virtual tax village in line with the transformation of the tax process from self-declaration based method to electronic data based method and with the aim of compiling and developing the tax information bank and using technology, taxpayers in a virtual tax space. It collects the ID card holders and their financial data with the help of modern technologies and by benefiting from systematic m...
متن کاملA Logical Language for Expressing Authorizations
A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of the policy enforced by the system. While this may be trivial for some requirements, specification of other requirements may become quite complex o...
متن کامل