TY - JOUR
T1 - Methods and limitations of security policy reconciliation
AU - McDaniel, Patrick
AU - Prakash, Atul
PY - 2002
Y1 - 2002
N2 - A security policy is a means by which participant session requirements are specified. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. This paper considers the limits and methods of reconciliation in a general-purpose policy model. We identify an algorithm for efficient two-policy reconciliation, and show that, in the worst-case, reconciliation of three or more policies is intractable. Further, we suggest efficient heuristics for the detection and resolution of intractable reconciliation. Based upon the policy model, we describe the design and implementation of the Ismene policy language. The expressiveness of Ismene, and indirectly of our model, is demonstrated through the representation and exposition of policies supported by existing policy languages. We conclude with brief notes on the integration and enforcement of Ismene policy within the Antigone communication system.
AB - A security policy is a means by which participant session requirements are specified. However, existing frameworks provide limited facilities for the automated reconciliation of participant policies. This paper considers the limits and methods of reconciliation in a general-purpose policy model. We identify an algorithm for efficient two-policy reconciliation, and show that, in the worst-case, reconciliation of three or more policies is intractable. Further, we suggest efficient heuristics for the detection and resolution of intractable reconciliation. Based upon the policy model, we describe the design and implementation of the Ismene policy language. The expressiveness of Ismene, and indirectly of our model, is demonstrated through the representation and exposition of policies supported by existing policy languages. We conclude with brief notes on the integration and enforcement of Ismene policy within the Antigone communication system.
UR - http://www.scopus.com/inward/record.url?scp=0036086451&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=0036086451&partnerID=8YFLogxK
U2 - 10.1109/SECPRI.2002.1004363
DO - 10.1109/SECPRI.2002.1004363
M3 - Article
AN - SCOPUS:0036086451
SN - 1063-7109
SP - 73
EP - 87
JO - Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
JF - Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
ER -