Towards System Integrity Protection with Graph-Based Policy Analysis

نویسندگان

  • Wenjuan Xu
  • Xinwen Zhang
  • Gail-Joon Ahn
چکیده

Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security policy and verifying whether an existing policy satisfies security objectives. To efficiently support these, an intuitive and cognitive policy analysis mechanism is desired for policy designers or security administrators due to the high complexity of policy configurations in contemporary systems. In this paper, we present a graph-based policy analysis methodology to identify TCBs with the consideration of different system applications and services. Through identifying information flows violating the integrity protection of TCBs, we also propose resolving principles to using our developed graph-based policy analysis tool.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards a measure of vulnerability, tenacity of a Graph

If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...

متن کامل

An analysis of factors affecting on customers’ adoption of internet-banking services using the graph theory

The rapid development of Internet and electronic businesses have stimulated the banking sector towards encouraging customers to internet banking (IB), However, the evidence indicates a lack of interest in the use of IB services. Therefore, this paper aims to identify affecting factors on customer adoption from IB and measure the influence of each factor on IB adoption. Based on an explorative l...

متن کامل

Modernizing the Legal Criminal Policy towards the Electronic Tax System

The virtual tax village in line with the transformation of the tax process from self-declaration based method to electronic data based method and with the aim of compiling and developing the tax information bank and using technology, taxpayers in a virtual tax space. It collects the ID card holders and their financial data with the help of modern technologies and by benefiting from systematic m...

متن کامل

A Logical Language for Expressing Authorizations

A major drawback of existing access control systems is that they have all been developed with a specific access control policy in mind. This means that all protection requirements (i.e., accesses to be allowed or denied) must be specified in terms of the policy enforced by the system. While this may be trivial for some requirements, specification of other requirements may become quite complex o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009