Skip to main content
Log in

Semantic description and verification of security policy based on ontology

  • Security of Information System
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

To solve the shortage problem of the semantic description scope and verification capability existed in the security policy, a semantic description method for the security policy based on ontology is presented. By defining the basic elements of the security policy, the relationship model between the ontology and the concept of security policy based on the Web ontology language (OWL) is established, so as to construct the semantic description framework of the security policy. Through modeling and reasoning in the Protégé, the ontology model of authorization policy is proposed, and the first-order predicate description logic is introduced to the analysis and verification of the model. Results show that the ontology-based semantic description of security policy has better flexibility and practicality.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Basin D, Juge V, Klaegtke F, et al. Enforceable security policies revisited [J]. ACM Transactions on Information and System Security, 2013, 16(1): 31–56.

    Article  Google Scholar 

  2. Han W L, Lei C. A survey on policy languages in network and security management [J]. Computer Network, 2012, 56(1): 477–489.

    Article  Google Scholar 

  3. Lymberopoulos L, Lupu E, Sloman M. Ponder policy implementation and validation in a CIM and differentiated services framework[C] // Proc of the IEEE/IFIP Network Operations and Management Symposium. Seoul: IEEE Press, 2004: 31–44.

    Google Scholar 

  4. Carroline D P K R, Hanne R N, Flemming N. The logic of XACML [J]. Science of Computer Programming, 2014, 83:80–105.

    Article  Google Scholar 

  5. Bertino E, Mileo A, Provetti A. PDL with preferences[C]// Proc of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks. Stockolm: IEEE Press, 2005: 213–222.

    Google Scholar 

  6. Xia C H, Wei Y D, Li X J, et al. A computer network defense policy specification language [J]. Journal of Computer Research and Development, 2009, 46(1):89–99 (Ch).

    Google Scholar 

  7. Bao Y B, Yin L H, Fang B X, et al. Logic-based dynamic security policy language and verification [J]. Journal of Computer Research and Development, 2013, 50(5): 932–941(Ch).

    Google Scholar 

  8. Shen Y M, Ma Y, Cao C G, et al. Faithful and full translations between logics [J]. Journal of Software, 2013, 24(7):1626–1637(Ch).

    Article  Google Scholar 

  9. Hu L K, Chen X, Chai X, et al. Multi-ontology system based approach of access control for semantic Web services [J]. Computer Science, 2012, 39(12): 107–113(Ch).

    CAS  Google Scholar 

  10. Ángel G C, Juan M G B, Ricardo C P, et al. SecurOntology: A semantic Web access control framework [J]. Computer Standards & Interfaces, 2011, 33(1): 42–49.

    Article  Google Scholar 

  11. Wei Z Q, Zhou W, Ren X J, et al. A strategy-proof trust based decision mechanism for pervasive computing environments [J]. Chinese Journal of Computers, 2012, 35(5): 871–882(Ch).

    Article  Google Scholar 

  12. Daniel F, Stefan F, Lukas L. Toward web-based information security knowledge sharing [J]. Information Security Technical Report, 2013, 17(4): 199–209.

    Article  Google Scholar 

  13. Zhu X D, Xiao F X, Huang Z Q, et al. Description logic based extended predictive model markup language EPMML [J]. Chinese Journal of Computers, 2012, 35(8): 1644–1654(Ch).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chenghua Tang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61462020, 61363006, 61163057), the Guangxi Experiment Center of Information Science Foundation (20130329) and the Guangxi Natural Science Foundation (2014GXNSFAA118375)

Biography: TANG Chenghua, male, Ph.D., research direction: information security, data mining, and security policy analysis.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tang, C., Wang, L., Tang, S. et al. Semantic description and verification of security policy based on ontology. Wuhan Univ. J. Nat. Sci. 19, 385–392 (2014). https://doi.org/10.1007/s11859-014-1029-x

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-014-1029-x

Key words

CLC number

Navigation