Skip to main content

Application-Oriented Security Policies and Their Composition

Position Paper

  • Conference paper
  • First Online:
Security Protocols (Security Protocols 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1550))

Included in the following conference series:

Abstract

We define the notion of the application-oriented security policy and suggest that it differs from that of a system-level, global security policy. We view a policy as a conjunction of security properties and argue that these properties are not always independent and, hence, cannot be analyzed (e.g., composed) individually. We also argue that some necessary policy properties fall outside of the Alpern-Schneider safety/liveness domain and, hence, are not subject to the Abadi-Lamport composition principle. We suggest several areas of research in policy definition, composition, and administration.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Abadi, L. Lamport: Composing specifications. In J. W. de Bakker, W. P. de Roever, G. Rosenberg (eds).: Stepwise Refinement of Distributed Systems. Lecture Notes in Computer Science, Vol. 430, Springer-Verlag, Berlin Heidelberg New York, 1990.

    Google Scholar 

  2. B. Alpern, F. Schneider: Defining Liveness. Information Processing Letters, vol. 21, no. 4, October 1985, pp. 181–185.

    Article  MATH  MathSciNet  Google Scholar 

  3. Common Criteria for Information Technology Security Evaluation, Version 2.0 Draft, GISA, NNCSA, CESG, NIST, NSA, December 1997.

    Google Scholar 

  4. Federal Criteria for Information Technology Security, Vol. 1, Chapter 3 and Appendix Version 1.0, NIST, NSA, December 1992.

    Google Scholar 

    Google Scholar 

  5. V. D. Gligor, S. I. Gavrila, and D. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. Proc. of the 1998 IEEE Symp. on Security and Privacy, Oakland, California, May 1998 (to appear).

    Google Scholar 

  6. H. M. Hinton and E. S. Lee: The Composability of Policies. Proc. of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1994, pp. 258–281.

    Google Scholar 

  7. J. McLean: A general theory of composition for a class of “possibilistic” properties. IEEE Transactions on Software Engineering, vol. 22, no. 1, January 1996, pp. 53–66.

    Article  Google Scholar 

  8. Trusted Database Interpretation of the TCSEC, NCSC-TG-21, Version 1, National Computer Security Center, April 1991.

    Google Scholar 

  9. Trusted Recovery Guideline, NCSC-TG-022, Version 1, National Computer Security Center, December 1989.

    Google Scholar 

  10. W. R. Shockley and R. R. Schell: TCB Subsets for Incremental Evaluation. Proc. of the Third Aerospace Computer Security Conference Orlando, Florida, December 1987, pp. 131–139.

    Google Scholar 

  11. Unified INFOSEC Criteria, INFOSEC Concepts, Section 3, Dependencies among TCSEC Requirements (unclassified), National Security Agency, 1993.

    Google Scholar 

  12. A. Zakinthinos and E. S. Lee: A General Theory of Security Properties. Proc. of 1997 IEEE Symposium on Security and Privacy, Oakland, California, May 1997, pp. 94–102.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gligor, V.D., Gavrila, S.I. (1998). Application-Oriented Security Policies and Their Composition. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_11

Download citation

  • DOI: https://doi.org/10.1007/3-540-49135-X_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65663-0

  • Online ISBN: 978-3-540-49135-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics