Abstract
We define the notion of the application-oriented security policy and suggest that it differs from that of a system-level, global security policy. We view a policy as a conjunction of security properties and argue that these properties are not always independent and, hence, cannot be analyzed (e.g., composed) individually. We also argue that some necessary policy properties fall outside of the Alpern-Schneider safety/liveness domain and, hence, are not subject to the Abadi-Lamport composition principle. We suggest several areas of research in policy definition, composition, and administration.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
M. Abadi, L. Lamport: Composing specifications. In J. W. de Bakker, W. P. de Roever, G. Rosenberg (eds).: Stepwise Refinement of Distributed Systems. Lecture Notes in Computer Science, Vol. 430, Springer-Verlag, Berlin Heidelberg New York, 1990.
B. Alpern, F. Schneider: Defining Liveness. Information Processing Letters, vol. 21, no. 4, October 1985, pp. 181–185.
Common Criteria for Information Technology Security Evaluation, Version 2.0 Draft, GISA, NNCSA, CESG, NIST, NSA, December 1997.
Federal Criteria for Information Technology Security, Vol. 1, Chapter 3 and Appendix Version 1.0, NIST, NSA, December 1992.
V. D. Gligor, S. I. Gavrila, and D. Ferraiolo: On the Formal Definition of Separation-of-Duty Policies and their Composition. Proc. of the 1998 IEEE Symp. on Security and Privacy, Oakland, California, May 1998 (to appear).
H. M. Hinton and E. S. Lee: The Composability of Policies. Proc. of 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, November 1994, pp. 258–281.
J. McLean: A general theory of composition for a class of “possibilistic” properties. IEEE Transactions on Software Engineering, vol. 22, no. 1, January 1996, pp. 53–66.
Trusted Database Interpretation of the TCSEC, NCSC-TG-21, Version 1, National Computer Security Center, April 1991.
Trusted Recovery Guideline, NCSC-TG-022, Version 1, National Computer Security Center, December 1989.
W. R. Shockley and R. R. Schell: TCB Subsets for Incremental Evaluation. Proc. of the Third Aerospace Computer Security Conference Orlando, Florida, December 1987, pp. 131–139.
Unified INFOSEC Criteria, INFOSEC Concepts, Section 3, Dependencies among TCSEC Requirements (unclassified), National Security Agency, 1993.
A. Zakinthinos and E. S. Lee: A General Theory of Security Properties. Proc. of 1997 IEEE Symposium on Security and Privacy, Oakland, California, May 1997, pp. 94–102.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gligor, V.D., Gavrila, S.I. (1998). Application-Oriented Security Policies and Their Composition. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_11
Download citation
DOI: https://doi.org/10.1007/3-540-49135-X_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65663-0
Online ISBN: 978-3-540-49135-4
eBook Packages: Springer Book Archive