Policy by Example: An Approach for Security Policy Specification
نویسندگان
چکیده
Policy specification for personal user data is a hard problem, as it depends on many factors that cannot be predetermined by system developers. Simultaneously, systems are increasingly relying on users to make security decisions. In this paper, we propose the approach of Policy by Example (PyBE) for specifying user-specific security policies. PyBE brings the benefits of the successful approach of programming by example (PBE) for program synthesis to the policy specification domain. In PyBE, users provide policy examples that specify if actions should be allowed or denied in certain scenarios. PyBE then predicts policy decisions for new scenarios. A key aspect of PyBE is its use of active learning to enable users to correct potential errors in their policy specification. To evaluate PyBE’s effectiveness, we perform a feasibility study with expert users. Our study demonstrates that PyBE correctly predicts policies with 76% accuracy across all users, a significant improvement over naive approaches. Finally, we investigate the causes of inaccurate predictions to motivate directions for future research in this promising new domain.
منابع مشابه
Specifying Digital Forensics: A Forensics Policy Approach
In this paper we present an approach to digital forensics specification based on forensic policy definition. Our methodology borrows from computer security policy specification, which has accumulated a significant body of research over the past 30 years. We first define the process of specifying forensics properties through a forensics policy and then present an example application of the proce...
متن کاملUsing Deontic Logic for Security Policy Specification
This paper analyses the problem of specifying a security policy for organizations. First, various issues related to the problem of an adequate and rigorous specification of a security policy are outlined in a context where security requirements usually remain informal and are difficult to satisfy. Then, it is proposed to use a logical language, previously studied in the literature, that seems t...
متن کاملMonetary Policy Reaction Functions in Iran: An Extended Kalman Filter Approach
Estimates of instrumental rules can be utilized to describe central bank's behavior and monetary policy stance. In the last decade, considerable attention has been given to time-varying parameter (TVP) specification of monetary policy rules. Constant-parameter reaction functions likely ignore the impact of model uncertainty, shifting preferences and nonlinearities of policymaker's choices. This...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملRule-based Specification and Analysis of Security Policies
We propose a formal framework for the specification and validation of security policies. A security policy responds to the authorisation requests of a system according to a certain number of rules and to the configuration of the system at the moment of the request. A system constrained by a security policy consists of two parts: on one hand, the set of rules describing the way the decisions are...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1707.03967 شماره
صفحات -
تاریخ انتشار 2017