Reasoning about secure interoperation using soft constraints

被引:0
|
作者
Bistarelli, S [1 ]
Foley, SN [1 ]
O'Sullivan, B [1 ]
机构
[1] CNR, Ist Informat & Telemat, I-56100 Pisa, Italy
来源
关键词
secure interoperation; constraint satisfaction;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of a network configuration is based not just on the security of its individual components and their direct interconnections, but also on the potential for systems to interoperate indirectly across network routes. Such interoperation has been shown to provide the potential for circuitous paths across a network that violate security. In this paper we propose a constraint-based framework for representing access control configurations of systems. The secure reconfiguration of a system is depicted as a constraint satisfaction problem.
引用
收藏
页码:173 / 186
页数:14
相关论文
共 50 条
  • [21] Reasoning about uniqueness constraints in object relational databases
    Khizder, VL
    Weddell, GE
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (05) : 1295 - 1306
  • [22] REASONING ABOUT NONLINEAR INEQUALITY CONSTRAINTS - A MULTILEVEL APPROACH
    CYRLUK, D
    KAPUR, D
    IMAGE UNDERSTANDING WORKSHOP /, 1989, : 904 - 915
  • [23] Reasoning about genetic mechanisms: Affordances and constraints for learning
    Haskel-Ittah, Michal
    Duncan, Ravit Golan
    Vazquez-Ben, Lucia
    Yarden, Anat
    JOURNAL OF RESEARCH IN SCIENCE TEACHING, 2020, 57 (03) : 342 - 367
  • [24] Equational reasoning using AC constraints
    Plaisted, DA
    Zhu, YS
    IJCAI-97 - PROCEEDINGS OF THE FIFTEENTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOLS 1 AND 2, 1997, : 108 - 113
  • [25] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [26] Secure interoperation in a multidomain environment employing RBAC policies
    Shafiq, B
    Joshi, JBD
    Bertino, E
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (11) : 1557 - 1577
  • [27] Decentralized Secure Interoperation in Multi-Domain Environments
    Feng Dengguo
    Wang Xingang
    Xu Zhen
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (01): : 1 - 7
  • [28] Secure Interoperation in Multidomain Environments Employing UCON Policies
    Lu, Jianfeng
    Li, Ruixuan
    Varadharajan, Vijay
    Lu, Zhengding
    Ma, Xiaopu
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 395 - +
  • [29] On policy evolution in centralized secure interoperation of multiple domains
    Feng Dengguo
    Wang Xingang
    Xu Zhen
    CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (03): : 389 - 395
  • [30] Using Hard Constraints for Representing Soft Constraints
    Regin, Jean-Charles
    INTEGRATION OF AI AND OR TECHNIQUES IN CONSTRAINT PROGRAMMING FOR COMBINATORIAL OPTIMIZATION PROBLEMS, 2011, 6697 : 176 - 189