224,702 research outputs found

    Preservation of Policy Adherence under Refinement

    Get PDF
    -Policy-based management is an approach to the management of systems with respect to issues such as security, access control and trust by the enforcement of policy rules. This paper addresses the problem of integrating the requirements imposed by a policy with the system development process. In order to take a policy specification into account in the development of a system specification, the notion of policy adherence is formalized as a relation between policy specifications and system specifications. Adherence of a system specification to a policy specification means that the former satisfies the latter. The integrated development process is supported by refinement, where both the policy specification and the system specification may be developed under any number of refinement steps. This paper characterizes the conditions under which adherence is preserved under refinement and identifies development rules that guarantee adherence preservation. By results of transitivity and compositionality the integrated development process and the analysis tasks can be conducted in a stepwise and modular way, thereby facilitating development. Oppdragsgiver: Research Council of Norwa

    Creating a Database for Test Items in National Examinations

    Get PDF
    This paper looks at how to generate questions for national and localexaminations without putting such questions (Items) at risk of leakage;reduce cost and time taken for such activities like time consuming itemsanalysis and moderation; and improve on the poor selection which oftencharacterized manually generated questions. These problems raise doubt onthe credibility of examinations and the innocent students who use suchcertificates are at the receiving end. The fundamental focus in this piece, ison how to use Database Management System (DBMS) to store questionsproduced during ‘Items Generation’ for easy selection of questions, gooddiscrimination index, high security provision, good item-difficultystratification, easy item analysis, a good retrieval system, specification forhardware requirement and software acquisition options

    Developing Secure and Safe Systems with Knowledge Acquisition for Automated Specification

    Get PDF
    On spetsiaalsed tehnikad, mida kasutatakse riskihalduses nii turvalisuse kui ohutuse konstrueerimise domeenides. Nende tehnikate vĂ€ljundid, mida tuntakse artefaktidena, on ĂŒksteisest eraldatud, mis toob kaasa mitmeid probleeme, kuna domeenid on sĂ”ltumatud ja ei ole domeeni, mis ĂŒhendaks neid mĂ”lemat. Probleemi keskmes on see, et turvalisus- ja ohutusinsenerid töötavad erinevates meeskondades kogu sĂŒsteemiarenduse elutsĂŒkli jooksul, mille tulemusena riskid ja ohud on ebapiisavalt kaetud. KĂ€esolevas magistritöös rakendatakse struktuurset lĂ€henemist, turvalisuse ja ohutuse integreerimiseks lĂ€bi SaS (Safety and Security) domeeni mudeli loomise, mis integreerib neid mĂ”lemaid. Lisaks töö kĂ€igus nĂ€idatakse, et on vĂ”imalik kasutada eesmĂ€rgipĂ”hist KAOS (Knowledge Acquisition in autOmated Specification) keelt ohtude ja riskide analĂŒĂŒsiks, nii et kaetud saavad nii ohutus- kui ka turvadomeen, muutes nende vĂ€ljundid e. artefaktid hĂ€sti struktureerituks, mille tulemusena toimub pĂ”hjalik analĂŒĂŒs ja suureneb usaldatavus. Me pakume vĂ€lja lahenduse, mis sisaldab sellise domeeni mudeli loomist, milles on integreeritud ohtutuse ja turvalisuse domeenid. See annab parema vĂ”rdlus- ja integreerimisvĂ”imaluse, leidmaks kahe domeeni vahelise kesktee ning ĂŒhendavad definitsioonid lĂ€bi nende kaardistamise ĂŒldises ontoloogias. Selline lahendus toob kokku turvalisuse ja ohutusedomeenide integratsiooni ĂŒhtsesse mudelisse, mille tulemusena tekib ohutus- ja turvalisustehnikate vahel vastastikune mĂ”justus ning toodab vĂ€ljundeid, mida peetakse usaldusartefaktideks ning kasutab KAOSt domeeni mudeliga, mis on ehitatud juhtumianalĂŒĂŒsi pĂ”hjal. Peale vastloodud mudeli rakendumist viiakse lĂ€bi katse, milles analĂŒĂŒsitakse sedasama juhtumit, vĂ”rdlemaks selle tulemusi teiste juba olemasolevate mudelite tulemustega, et uurida sellise domeeni mĂ”ttekust. Struktureeritud lĂ€henemine vĂ”ib seega toimida liidesena, mis lihtsustab aktiivset interaktsiooni riski- ja ohuhalduses, aidates leida lahendusi probleemidele ja vastuoludele, mille lahendamiseks on vaja integreerida ohutuse ja turvalisuse domeenid ja kasutada unifitseeritud sĂŒsteemianalĂŒĂŒsi tehnikat, mille tulemusena tekib analĂŒĂŒsi tsentraalsus.There are special techniques languages that are used in risk management in both domains of safety engineering and security engineering. The outputs, known as artifacts, of these techniques are separated from each other leading to several difficulties due to the fact that domains are independent and that there is no one unifying domain for the two. The problem is that safety engineers and security engineers work in separated teams from throughout the system development life cycle, which results in incomplete coverage of risks and threats. The thesis applies a structured approach to integration between security and safety by creating a SaS (Safety and Security) domain model. Furthermore, it demonstrates that it is possible to use goal-oriented KAOS (Knowledge Acquisition in automated Specification) language in threat and hazard analysis to cover both safety and security domains making their outputs, or artifacts, well-structured and comprehensive, which results in dependability due to the comprehensiveness of the analysis. The structured approach can thereby act as an interface for active interactions in risk and hazard management in terms of universal coverage, finding solutions for differences and contradictions which can be overcome by integrating the safety and security domains and using a unified system analysis technique (KAOS) that will result in analysis centrality

    A Quantum Safe Key Hierarchy and Dynamic Security Association for LTE/SAE in 5G Scenario

    Get PDF
    Millions of devices are going to participate in 5G producing a huge space for security threats. The 5G specification goals require rigid and robust security protocol against such threats. Quantum cryptography is a recently emerged term in which we test the robustness of security protocols against Quantum computers. Therefore, in this paper, we propose a security protocol called Quantum Key GRID for Authentication and Key Agreement (QKG-AKA) scheme for the dynamic security association. This scheme is efficiently deployed in Long Term Evolution (LTE) architecture without any significant modifications in the underlying base system. The proposed QKGAKA mechanism is analyzed for robustness and proven safe against quantum computers. The simulation results and performance analysis show drastic improvement regarding security and key management over existing schemes

    Policy based roles for distributed systems security

    No full text
    Distributed systems are increasingly being used in commercial environments necessitating the development of trustworthy and reliable security mechanisms. There is often no clear informal or formal specification of enterprise authorisation policies and no tools to translate policy specifications to access control implementation mechanisms such as capabilities or Access Control Lists. It is thus difficult to analyse the policy to detect conflicts or flaws and it is difficult to verify that the implementation corresponds to the policy specification. We present in this paper a framework for the specification of management policies. We are concerned with two types of policies: obligations which specify what activities a manager or agent must or must not perform on a set of target objects and authorisations which specify what activities a subject (manager or agent) can or can not perform on the set of target objects. Management policies are then grouped into roles reflecting the organisation..

    XRound : A reversible template language and its application in model-based security analysis

    Get PDF
    Successful analysis of the models used in Model-Driven Development requires the ability to synthesise the results of analysis and automatically integrate these results with the models themselves. This paper presents a reversible template language called XRound which supports round-trip transformations between models and the logic used to encode system properties. A template processor that supports the language is described, and the use of the template language is illustrated by its application in an analysis workbench, designed to support analysis of security properties of UML and MOF-based models. As a result of using reversible templates, it is possible to seamlessly and automatically integrate the results of a security analysis with a model. (C) 2008 Elsevier B.V. All rights reserved

    Model Based Development of Quality-Aware Software Services

    Get PDF
    Modelling languages and development frameworks give support for functional and structural description of software architectures. But quality-aware applications require languages which allow expressing QoS as a first-class concept during architecture design and service composition, and to extend existing tools and infrastructures adding support for modelling, evaluating, managing and monitoring QoS aspects. In addition to its functional behaviour and internal structure, the developer of each service must consider the fulfilment of its quality requirements. If the service is flexible, the output quality depends both on input quality and available resources (e.g., amounts of CPU execution time and memory). From the software engineering point of view, modelling of quality-aware requirements and architectures require modelling support for the description of quality concepts, support for the analysis of quality properties (e.g. model checking and consistencies of quality constraints, assembly of quality), tool support for the transition from quality requirements to quality-aware architectures, and from quality-aware architecture to service run-time infrastructures. Quality management in run-time service infrastructures must give support for handling quality concepts dynamically. QoS-aware modeling frameworks and QoS-aware runtime management infrastructures require a common evolution to get their integration
    • 

    corecore