System Security Policy

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 153 Experts worldwide ranked by ideXlab platform

Rodolphe Ortalo - One of the best experts on this subject based on the ideXlab platform.

  • a flexible method for information System Security Policy specification
    European Symposium on Research in Computer Security, 1998
    Co-Authors: Rodolphe Ortalo
    Abstract:

    This paper presents a method for the specification of the Security of information Systems. The proposed approach provides a flexible and expressive specification method, corresponding to the specific needs of organizations. First, we outline the overall guidelines of the Security Policy definition process, and the different consistency issues associated to the description of the Security requirements of an organization information System. The specification language used is based on a convenient extension of deontic logic. The formalism and its extensions are defined briefly. To illustrate the use of this formalism, the paper presents how the method applies to the description of the Security requirements of a real organization: a medium-size bank agency.

  • ESORICS - A Flexible Method for Information System Security Policy Specification
    Computer Security — ESORICS 98, 1998
    Co-Authors: Rodolphe Ortalo
    Abstract:

    This paper presents a method for the specification of the Security of information Systems. The proposed approach provides a flexible and expressive specification method, corresponding to the specific needs of organizations. First, we outline the overall guidelines of the Security Policy definition process, and the different consistency issues associated to the description of the Security requirements of an organization information System. The specification language used is based on a convenient extension of deontic logic. The formalism and its extensions are defined briefly. To illustrate the use of this formalism, the paper presents how the method applies to the description of the Security requirements of a real organization: a medium-size bank agency.

Yu Shun-zheng - One of the best experts on this subject based on the ideXlab platform.

  • Self-distribution of Network Security Policy Based on Structure-dissimilarity
    Computer Science, 2009
    Co-Authors: Yu Shun-zheng
    Abstract:

    The operations of Security Policy's request,update,and execute have put forward higher requirements of the Policy distribution.For purpose of resolving the distribution efficiency of the network Security Policy,the Security Policy self-distribution mathematic model and structural model were proposed based on structure-dissimilarity,which introduced the concepts of distribution factor,Security domain,etc.Expression and making ways of the structure-dissimilarity Policy faced on attribute characters and operation were analyzed emphatically.The Security Policy searching algorithm,comparing algorithm,structure-dissimilarity Policy building algorithm,address assigning and data transmitting algorithm based on Security domain were presented.Compared with the classical entire distribution model,the proposed methods are superior to enhance the System Security Policy disposal efficiency,and occupy the lesser resources of network channel.

Dengguo Feng - One of the best experts on this subject based on the ideXlab platform.

  • operating System Security Policy hardening via capability dependency graphs
    International Conference on Information Security, 2015
    Co-Authors: Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
    Abstract:

    An operating System relies heavily on its access control mechanism to defend against various attacks. The complexities of modern access control mechanisms and the scale of possible configurations are often overwhelming to System administrators and software developers. Therefore, misconfigurations are very common and the Security consequences are serious. It is very necessary to detect and eliminate these misconfigurations. We propose an automated and Systematic approach to address how to correct the misconfigurations based on capability dependency graph generating and MaxSAT solving. Given the attacker’s initial capabilities, we first automatically generate a capability dependency graph to describe attacker’s potential capabilities and the dependency relationships among these capabilities. Based on the capability dependency graph, we then develop a solution to automate the task of hardening operating System Security Policy against multi-step attacks resulting from misconfigurations. In this solution, we first represent each capability obtained by an attacker as a propositional logic formula of initial conditions, and then transfer the Policy hardening problem to a MaxSAT problem. Finally, we present a notation called normal capability loss to aid an administrator to select an optimal hardening solution leading to minimum System usability loss. We apply our approach to analyze misconfigurations in Ubuntu10.04 shipped with SELinux and study an attack case to evaluate the effectiveness of our approach.

  • ISPEC - Operating System Security Policy Hardening via Capability Dependency Graphs
    Information Security Practice and Experience, 2015
    Co-Authors: Zhihui Han, Liang Cheng, Yang Zhang, Dengguo Feng
    Abstract:

    An operating System relies heavily on its access control mechanism to defend against various attacks. The complexities of modern access control mechanisms and the scale of possible configurations are often overwhelming to System administrators and software developers. Therefore, misconfigurations are very common and the Security consequences are serious. It is very necessary to detect and eliminate these misconfigurations. We propose an automated and Systematic approach to address how to correct the misconfigurations based on capability dependency graph generating and MaxSAT solving. Given the attacker’s initial capabilities, we first automatically generate a capability dependency graph to describe attacker’s potential capabilities and the dependency relationships among these capabilities. Based on the capability dependency graph, we then develop a solution to automate the task of hardening operating System Security Policy against multi-step attacks resulting from misconfigurations. In this solution, we first represent each capability obtained by an attacker as a propositional logic formula of initial conditions, and then transfer the Policy hardening problem to a MaxSAT problem. Finally, we present a notation called normal capability loss to aid an administrator to select an optimal hardening solution leading to minimum System usability loss. We apply our approach to analyze misconfigurations in Ubuntu10.04 shipped with SELinux and study an attack case to evaluate the effectiveness of our approach.

Yi Xie - One of the best experts on this subject based on the ideXlab platform.

  • implementation and realization of network Security Policy based on rule engine
    Journal of Networks, 2011
    Co-Authors: Chenghua Tang, Yi Xie
    Abstract:

    In order to solve the implementation and realization efficiency problem of the network information System Security Policy, an improved object-oriented Rete algorithm and its network structure model are proposed, and on this basis, the rule engine is introduced, where the implementation and realization steps and efficiency analysis are given. Result shows that the algorithm and network structure can effectively improve the efficiency of System enforcement and realization. The technology can be adapted to establishing and controlling the Policy service in the extensive network environment.

  • An Improved Object-Oriented Rete Algorithm and Network Structure Model
    2010 2nd International Symposium on Information Engineering and Electronic Commerce, 2010
    Co-Authors: Chenghua Tang, Yi Xie
    Abstract:

    In order to solve the implementation efficiency problem of the network information System Security Policy, an improved object-oriented Rete algorithm and network structure model are proposed. The control methods of the nodes and tokens in the matching algorithm with the pattern join order are studied, that core idea is to use the separate matches to construct matching tree dynamically based on content for achieving significantly reduce the computational results. The improved object-oriented Rete optimize network structure based on the extended Rete class structure is proposed. Result shows that the algorithm and network structure can effectively improve the efficiency of System implementation.

Milos Doroslovacki - One of the best experts on this subject based on the ideXlab platform.

  • covert timing channels exploiting non uniform memory access based architectures
    Great Lakes Symposium on VLSI, 2017
    Co-Authors: Fan Yao, Guru Venkataramani, Milos Doroslovacki
    Abstract:

    Covert timing channels are a class of information leakage attacks where two processes, namely the trojan and spy, collude with intent to stealthily exfiltrate privileged information even when the underlying System Security Policy prohibits any direct communication between the two processes. In this paper, we present a new type of covert timing channel that exploits the access timing difference between various caches in Non-Uniform Memory Access (NUMA)-based architectures, especially multi-socket CPUs. We demonstrate a realistic covert timing channel implemented on a dual-socket Intel Xeon server. We then explore use of statistical analysis techniques to characterize and quantify the presence of covert timing channel activity. Our experimental results show that such quantification techniques could be a useful first step in formulating an effective defense against NUMA-based covert timing channels.

  • ACM Great Lakes Symposium on VLSI - Covert Timing Channels Exploiting Non-Uniform Memory Access based Architectures
    Proceedings of the on Great Lakes Symposium on VLSI 2017, 2017
    Co-Authors: Fan Yao, Venkataramani, Milos Doroslovacki
    Abstract:

    Covert timing channels are a class of information leakage attacks where two processes, namely the trojan and spy, collude with intent to stealthily exfiltrate privileged information even when the underlying System Security Policy prohibits any direct communication between the two processes. In this paper, we present a new type of covert timing channel that exploits the access timing difference between various caches in Non-Uniform Memory Access (NUMA)-based architectures, especially multi-socket CPUs. We demonstrate a realistic covert timing channel implemented on a dual-socket Intel Xeon server. We then explore use of statistical analysis techniques to characterize and quantify the presence of covert timing channel activity. Our experimental results show that such quantification techniques could be a useful first step in formulating an effective defense against NUMA-based covert timing channels.