Abstract
Most organizations currently build customized security policies by extending the principles and guidelines suggested by generic security policies. This method cannot guarantee that the resulting policies are compatible, neither it can ensure that the resulting protection levels are equivalent. We introduce a Security Policies Repository (SPR), which consists of a knowledge base, storing multiple security policies in a structured way. The SPR facilitates the juxtaposition of security policies, in order to detect, analyze, and resolve conflicts, and to compare and negotiate the protection level of each of the co- operating information systems. Reconciliation of security policies is achieved by means of developing mutually accepted meta-policies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kokolakis, S., Gritzalis, D., Katsikas, S.: Generic security policies for healthcare information systems. Health Informatics Journal 4(3), 184–195 (1998)
Kokolakis, S., Kiountouzis, E.A.: Achieving interoperability in a multiple-security-policies environment. Computers & Security 19(3), 267–281 (2000)
Brewer, D., Nash, M.: The Chinese Wall Security Policy. In: Proc. of the 1989 IEEE Symposium on Security and Privacy, pp. 206–214. IEEE Press, Los Alamitos (1989)
Lupu, E., Sloman, M.: Conflicts in policy-based distributed systems management. IEEE Transactions of Software Engineering 25(6) (1999)
Jarke, M., Gallersdorfer, R., Jeusfeld, M., Staudt, M., Eherer, S.: Concept Base: A deductive object base for metadata management. Journal of Intelligent Information Systems 4(2), 167–192 (1995)
Mylopoulos, J., Borgida, A., Jarke, M., Koubarakis, M.: Telos: Representing knowledge about information systems. ACM Transactions on Information Systems 8(4), 325–362 (1990)
Jeusfeld, M., Jarke, M., Nissen, H., Staudt, M.: ConceptBase: Managing conceptual models about information systems. In: Berns, et al. (eds.) Handbook of Architectures of Information Systems. Springer, Heidelberg (1998)
Gangopadhyay, D., Barsalou, T.: On the semantic equivalence of heterogeneous populations in multimodel, multidatabase systems. SIGMOD Record 20(4) (1991)
Spanoudakis, G., Constantopoulos, P.: Integrating specifications: A similarity reasoning approach. Automated Software Engineering Journal 2(4), 311–342 (1995)
Sheth, A., Larson, J.: Federated database systems for managing distributed, heterogeneous and autonomous databases. ACM Computing Surveys 22(3) (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kokolakis, S., Lambrinoudakis, C., Gritzalis, D. (2003). A Knowledge-Based Repository Model for Security Policies Management. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_9
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive