Implementation of a Formal Security Policy Refinement Process in WBEM Architecture

2007 ◽  
Vol 15 (2) ◽  
pp. 241-266 ◽  
Author(s):  
Romain Laborde ◽  
Michel Kamel ◽  
François Barrère ◽  
Abdelmalek Benzekri
Author(s):  
Jorge Bernal Bernabé ◽  
Juan M. Marín Pérez ◽  
Jose M. Alcaraz Calero ◽  
Jesús D. Jiménez Re ◽  
Félix J.G. Clemente ◽  
...  

Policy-based management of information systems enables the specification of high-level policies which need to be refined into lower level configurations suitable to be directly applied to services and final devices in order to achieve the high-level behavior previous specified. This chapter presents a proposal for describing high-level security policies and for carrying out the policy refinement process for which low level policies and configurations are achieved. Firstly, an analysis of different research works related to the specification of security policy is provided. Then, a detailed description of the information model used for describing the information systems and the policies is described. After that, the language designed for specifying high level security policies is explained as well as the low level language based on the Common Information Model. Finally, some aspect about the policy refinement process done in the policy-based system in order to achieve low-level policies from the high-level security policies is outlined together with a description of the tools which can assist in the definition of the security policies and in the process refinement process.


Author(s):  
Rafae Bhatti ◽  
Tyrone Grandison

With the adoption of Electronic Medical Records (EMRs), an increasing number of health-related Web applications are now available to consumers, providers and partners. While this transformation offers huge benefits, there are security and privacy concerns integral to the process of electronic healthcare delivery. In this work, the authors first survey the body of evidence to emphasize the design of appropriate security solutions for electronic healthcare applications. The successful solutions will always comply with the prime directive of healthcare - “nothing should interfere with delivery of care” (Grandison and Davis, 2007). The authors then formally present the problem of reconciling security and privacy policies with the actual healthcare workflow, which we refer to as the policy coverage problem. They outline a technical solution to the problem based on the concept of policy refinement, and develop a privacy protection architecture called PRIMA. They also offer guidelines for electronic healthcare applications to ensure adequate policy coverage. The ultimate goal is that electronic healthcare applications should be made secure without compromising usability.


2021 ◽  
Author(s):  
Michel Bonfim ◽  
Fred Freitas ◽  
Stenio Fernandes

Management in NFV scenarios is a complex task. In this scenario, automated policy refinement can be used to enforce NFV-MANO functions to deal with the increased complexity. However, existing solutions do not perform policy analysis. Therefore, in this work, we propose a semantic model in OWL 2, named Onto-Planner, to assist the policy refinement process for NFV-MANO systems. Preliminary results show that Onto-Planner provides policy analysis when a DL reasoner is applied.


Sign in / Sign up

Export Citation Format

Share Document