Semantic context aware security policy deployment

Stere Preda, Frédéric Cuppens, Nora Cuppens-Boulahia, Joaquin G. Alfaro, Laurent Toutain, Yehia Elrakaiby

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the security devices. The complexity of the security requirements is additionally increased when contextual constraints are taken into account. Such situations appear when addressing the dynamism of some security requirements or when searching a finer granularity for the security rules. The context denotes those specific conditions in which the security requirements are to be met. (Re)deploying a contextual security policy depends on the security device functionalities: either (1) the devices include all functionalities necessary to deal with a context and the policy is consequently deployed for ensuring its automatic changes or (2) the devices do not have the right functionalities to entirely interpret a contextual requirement. We present a solution to cope with this issue: the (re)deployment of access control policies in a system that lacks the necessary functionalities to deal with contexts.

Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages251-261
Number of pages11
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: 10 Mar 200912 Mar 2009

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Conference

Conference4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Country/TerritoryAustralia
CitySydney, NSW
Period10/03/0912/03/09

Keywords

  • Access control
  • Network security
  • PDP
  • PEP

Fingerprint

Dive into the research topics of 'Semantic context aware security policy deployment'. Together they form a unique fingerprint.

Cite this