Skip to main content

Integrating Advanced Security Certification and Policy Management

  • Conference paper
  • First Online:
Cyber Security and Privacy (CSP 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 182))

Included in the following conference series:

Abstract

Recent models of software provisioning based on cloud architectures co-exist and interact with in-premises large and heterogeneous software ecosystems. In this increasingly complex landscape, organizations and users are striving to deal with assurance in all phases of software life cycle: acquisition, installation, use and maintenance. In this paper, we start by describing the notion of machine-readable security certificates, and discuss how they can be used for assurance-based software selection. Then, we introduce some models and tools for administrators for the automatic management of security policies, which include policy conflict detection. Finally, we discuss how these two approaches can be integrated for supporting organization to (semi-) automatically address the security requirements throughout the entire software life cycle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The FISMA Implementation Project was established in January 2003 to produce security standards and guidelines required by US legislation.

  2. 2.

    In some cases software vendors may prefer to remove this information to reduce the risk of possible disclosure of the internal functionalities of the software.

  3. 3.

    For each test case, we show input (I) to the system (including related conditions) and expected output (EO).

  4. 4.

    Our certificate is conditioned to users trusting the certificate-to-service binding. Such binding can be made trustworthy by a signature of the supplier, or even via a standard ISO/IEC 11889 Trusted Platform Module (TPM).

References

  1. Damiani, E., Ardagna, C.A., Ioini, N.E.: Open Source Systems Security Certification, 1st edn. Springer, Heidelberg (2008)

    Google Scholar 

  2. ITSEC: Common criteria for information technology security evaluation

    Google Scholar 

  3. Anisetti, M., Ardagna, C., Damiani, E.: Toward certification of services. In: International Workshop on Business System Management and Engineering (BSME 2010), Malaga, Spain, June 2010

    Google Scholar 

  4. Bezzi, M., Sabetta, A., Spanoudakis, G.: An architecture for certification-aware service discovery. In: 2011 1st International Workshop on Securing Services on the Cloud (IWSSC), pp. 14–21. IEEE (2011)

    Google Scholar 

  5. Anisetti, M., Ardagna, C., Damiani, E.: Fine-grained modeling of web services for test-based security certification. In: 2011 IEEE International Conference on Services Computing (SCC), pp. 456–463, July 2011

    Google Scholar 

  6. Baresi, L., Di Nitto, E.: Test and Analysis of Web Services. Springer, New York (2007)

    Book  Google Scholar 

  7. Bozkurt, M., Harman, M., Hassoun, Y.: Testing web services: a survey. Technical Report TR-10-01. Department of Computer Science, King’s College London, January 2010

    Google Scholar 

  8. Canfora, G., di Penta, M.: Service-oriented architectures testing: a survey. In: De Lucia, A., Ferrucci, F. (eds.) ISSSE 2006-2008. LNCS, vol. 5413, pp. 78–105. Springer, Heidelberg (2009)

    Google Scholar 

  9. Anisetti, M., Ardagna, C., Damiani, E.: Fine-grained modeling of web services for test-based security certification. In: Procedings of the 8th International Conference on Service Computing (SCC 2011), Washington, DC, USA, July 2011

    Google Scholar 

  10. Anisetti, M., Ardagna, C., Damiani, E., Saonara, F.: A test-based security certification scheme for web services. ACM Trans. Web (TWEB) 7, 1–41 (2013). http://www.crema.unimi.it/Biblioteca/Note_pdf/163.pdf

  11. Plate, H.: Policy and security configuration management. In: Fischer-Hübner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 229–231. Springer, Heidelberg (2012)

    Google Scholar 

  12. Paraboschi, S.: Integrated management of security policies. In: Li, Y. (ed.) DBSec. LNCS, vol. 6818, pp. 12–13. Springer, Heidelberg (2011)

    Google Scholar 

  13. De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive web applications. ACM Trans. Web 6(2), 1–44 (2012)

    Article  Google Scholar 

  14. Casalino, M.M., Mangili, M., Plate, H., Ponta, S.E.: Detection of configuration vulnerabilities in distributed (Web) environments. In: Keromytis, A.D., Di Pietro, R. (eds.) SecureComm 2012. LNICST, vol. 106, pp. 131–148. Springer, Heidelberg (2013)

    Google Scholar 

Download references

Acknowledgments

This work is partially supported by projects PoSecco (Grant No. 257129 - www.posecco.eu) and Assert4Soa (Grant No. 257351 - www.assert4soa.eu).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefano Paraboschi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bezzi, M., Damiani, E., Paraboschi, S., Plate, H. (2013). Integrating Advanced Security Certification and Policy Management. In: Felici, M. (eds) Cyber Security and Privacy. CSP 2013. Communications in Computer and Information Science, vol 182. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41205-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41205-9_5

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41204-2

  • Online ISBN: 978-3-642-41205-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics