1,771 research outputs found

    Towards Data Protection Compliance

    Get PDF
    Privacy and data protection are fundamental issues nowadays for every organization. This paper calls for the development of methods, techniques and infrastructure to allow the deployment of privacy-aware IT systems, in which humans are integral part of the organizational processes and accountable for their possible misconduct. In particular, we discuss the challenges to be addressed in order to improve organizations privacy practices, as well as the approach to ensure compliance with legal requirements and increasing efficiency

    Static Enforcement of Role-Based Access Control

    Full text link
    We propose a new static approach to Role-Based Access Control (RBAC) policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system's architecture. We apply this new approach to policies restricting calls to methods in Java applications. We present a language to express RBAC policies on calls to methods in Java, a set of design patterns which Java programs must adhere to for the policy to be enforced statically, and a description of the checks made by our static verifier for static enforcement.Comment: In Proceedings WWV 2014, arXiv:1409.229

    The Profiling Potential of Computer Vision and the Challenge of Computational Empiricism

    Full text link
    Computer vision and other biometrics data science applications have commenced a new project of profiling people. Rather than using 'transaction generated information', these systems measure the 'real world' and produce an assessment of the 'world state' - in this case an assessment of some individual trait. Instead of using proxies or scores to evaluate people, they increasingly deploy a logic of revealing the truth about reality and the people within it. While these profiling knowledge claims are sometimes tentative, they increasingly suggest that only through computation can these excesses of reality be captured and understood. This article explores the bases of those claims in the systems of measurement, representation, and classification deployed in computer vision. It asks if there is something new in this type of knowledge claim, sketches an account of a new form of computational empiricism being operationalised, and questions what kind of human subject is being constructed by these technological systems and practices. Finally, the article explores legal mechanisms for contesting the emergence of computational empiricism as the dominant knowledge platform for understanding the world and the people within it

    Enforcing security policies with runtime monitors

    Get PDF
    Le monitorage (monitoring) est une approche pour la sĂ©curisation du code qui permet l'exĂ©cution d’un code potentiellement malicieux en observant son exĂ©cution, et en intervenant au besoin pour Ă©viter une violation d’une politique de sĂ©curitĂ©. Cette mĂ©thode a plusieurs applications prometteuses, notamment en ce qui a trait Ă  la sĂ©curisation du code mobile. Les recherches acadĂ©miques sur le monitorage se sont gĂ©nĂ©ralement concentrĂ©es sur deux questions. La premiĂšre est celle de dĂ©limiter le champ des politiques de sĂ©curitĂ© applicables par des moniteurs opĂ©rant sous diffĂ©rentes contraintes. La seconde question est de construire des mĂ©thodes permettant d’insĂ©rer un moniteur dans un programme, ce qui produit un nouveau programme instrumentĂ© qui respecte la politique de sĂ©curitĂ© appliquĂ©e par ce moniteur. Mais malgrĂ© le fait qu’une vaste gamme de moniteurs a Ă©tĂ© Ă©tudiĂ©e dans la littĂ©rature, les travaux sur l’insertion des moniteurs dans les programmes se sont limitĂ©s Ă  une classe particuliĂšre de moniteurs, qui sont parmi les plus simples et les plus restreint quant Ă  leur champ de politiques applicables. Cette thĂšse Ă©tend les deux avenues de recherches mentionnĂ©es prĂ©cĂ©demment et apporte un Ă©clairage nouveau Ă  ces questions. Elle s’attarde en premier lieu Ă  Ă©tendre le champ des politiques applicables par monitorage en dĂ©veloppabt une nouvelle approche pour l’insertion d’un moniteur dans un programme. En donnant au moniteur accĂšs Ă  un modĂšle du comportement du programme, l’étude montre que le moniteur acquiert la capacitĂ© d’appliquer une plus vaste gamme de politiques de sĂ©curitĂ©. De plus, les recherches ont aussi dÂŽemontrĂ© qu’un moniteur capable de transformer l’exĂ©cution qu’il surveille est plus puissant qu’un moniteur qui ne possĂšde pas cette capacitĂ©. Naturellement, des contraintes doivent ĂȘtre imposĂ©es sur cette capacitĂ© pour que l’application de la politique soit cohĂ©rente. Autrement, si aucune restriction n’est imposĂ©e au moniteur, n’importe quelle politique devient applicable, mais non d’une maniĂšre utile ou dĂ©sirable. Dans cette Ă©tude, nous proposons deux nouveaux paradigmes d’application des politiques de sĂ©curitĂ© qui permettent d’incorporer des restrictions raisonnables imposĂ©es sur la capacitĂ© des moniteurs de transformer les exĂ©cutions sous leur contrĂŽle. Nous Ă©tudions le champ des politiques applicables avec ces paradigmes et donnons des exemples de politiques rĂ©elles qui peuvent ĂȘtre appliquĂ©es Ă  l’aide de notre approche.Execution monitoring is an approach that seeks to allow an untrusted code to run safely by observing its execution and reacting if need be to prevent a potential violation of a user-supplied security policy. This method has many promising applications, particularly with respect to the safe execution of mobile code. Academic research on monitoring has generally focused on two questions. The first, relates to the set of policies that can be enforced by monitors under various constraints and the conditions under which this set can be extended. The second question deals with the way to inline a monitor into an untrusted or potentially malicious program in order to produce a new instrumented program that provably respects the desired security policy. This study builds on the two strands of research mentioned above and brings new insights to this study. It seeks, in the first place, to increase the scope of monitorable properties by suggesting a new approach of monitor inlining. By drawing on an a priori model of the program’s possible behavior, we develop a monitor that can enforce a strictly larger set of security properties. Furthermore, longstanding research has showed that a monitor that is allowed to transform its input is more powerful than one lacking this ability. Naturally, this ability must be constrained for the enforcement to be meaningful. Otherwise, if the monitor is given too broad a leeway to transform valid and invalid sequences, any property can be enforced, but not in a way that is useful or desirable. In this study, we propose two new enforcement paradigms which capture reasonable restrictions on a monitor’s ability to alter its input. We study the set of properties enforceable if these enforcement paradigms are used and give examples of real-life security policies that can be enforced using our approach

    What can you verify and Enforce at Runtime?

    Get PDF
    International audienceThe underlying property, its definition and representation play a major role when monitoring a system. Having a suitable and convenient framework to express properties is thus a concern for runtime analysis. It is desirable to delineate in this framework the sets of properties for which runtime analysis approaches can be applied to. This paper presents a unified view of runtime verification and enforcement of properties in the Safety-Progress classification. Firstly, we extend the Safety-Progress classification of properties in a runtime context. Secondly, we characterize the set of properties which can be verified (monitorable properties) and enforced (enforceable properties) at runtime. We propose in particular an alternative definition of ''property monitoring'' to the one classically used in this context. Finally, for the delineated sets of properties, we define specialized verification and enforcement monitors
    • 

    corecore