Advertisement

HiPoLDS: A Security Policy Language for Distributed Systems

  • Matteo Dell’Amico
  • Gabriel Serme
  • Muhammad Sabir Idrees
  • Anderson Santana de Olivera
  • Yves Roudier
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7322)

Abstract

Expressing security policies to govern distributed systems is a complex and error-prone task. Policies are hard to understand, often expressed with unfriendly syntax, making it difficult to security administrators and to business analysts to create intelligible specifications. We introduce the Hierarchical Policy Language for Distributed Systems (HiPoLDS ). HiPoLDS has been designed to enable the specification of security policies in distributed systems in a concise, readable, and extensible way. HiPoLDS’s design focuses on decentralized execution environments under the control of multiple stakeholders. Policy enforcement employs distributed reference monitors who control the flow of information between services. HiPoLDS allows the definition of both abstract and concrete policies, expressing respectively high-level properties required and concrete implementation details to be ultimately introduced into the service implementation.

Keywords

Access Control Policy Language Security Policy Security Property Access Control Policy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Bauer, L., Ligatti, J., Walker, D.: A language and system for composing security policies. Tech. Rep. TR-699-04. Princeton University (2004)Google Scholar
  2. 2.
    Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. J. of Computer Security 18(4), 619–665 (2010)Google Scholar
  3. 3.
    Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1–35 (2002)CrossRefGoogle Scholar
  4. 4.
    Bunge, R., Chung, S., Endicott-Popovsky, B., McLane, D.: An operational framework for service oriented architecture network security. In: Proc. HICCS, p. 312 (2008)Google Scholar
  5. 5.
  6. 6.
    Cuppens, F., Cuppens-Boulahia, N., Ramard, T.: Availability enforcement by obligations and aspects identification. In: Proc. ARES, pp. 229–239 (2006)Google Scholar
  7. 7.
    Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–38. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  8. 8.
    Dantas, D.S., Walker, D.: Harmless advice. In: Morrisett, J.G., Jones, S.L.P. (eds.) POPL, pp. 383–396. ACM (2006)Google Scholar
  9. 9.
    Dell’Amico, M., Idrees, M.S., Roudier, Y., de Oliveira, A.S., Serme, G., Harel, G.: Language definition for security specifications. Deliverable D2.2, The CESSA project (May 2011), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publications:d2-2.pdf
  10. 10.
    Douence, R., Grall, H., Mejía, I., Royer, J.C., Südhold, M., Idrees, M.S., Roudier, Y., Leroux, J., Rivard, F., Pazzaglia, J., Serme, G.: Survey and requirements analysis. Deliverable D1.1, The CESSA project (June 2010), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publications:d1-1.pdf
  11. 11.
    Dougherty, D.J., Kirchner, C., Kirchner, H., de Oliveira, A.S.: Modular Access Control Via Strategic Rewriting. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 578–593. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  12. 12.
    Gruschka, N., Luttenberger, N.: Protecting web services from DOS attacks by SOAP message validation. Security and Privacy in Dynamic Environments (2006)Google Scholar
  13. 13.
    Sabir Idrees, M., Serme, G., Roudier, Y., de Oliveira, A.S., Grall, H., Südholt, M.: Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 190–205. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Li, J.X., Li, B., Li, L., Che, T.S.: A policy language for adaptive web services security framework. In: ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 1, pp. 261–266 (2007)Google Scholar
  15. 15.
    Moses, T. (ed.): Extensible access control markup language (xacml) version 2.0. Tech. rep. OASIS Standard (2005)Google Scholar
  16. 16.
    Myers, A.C., Liskov, B.: Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology 9(4), 410–442 (2000)CrossRefGoogle Scholar
  17. 17.
  18. 18.
    von Oheimb, D., Mödersheim, S.: ASLan++ — A Formal Security Specification Language for Distributed Systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2011. LNCS, vol. 6957, pp. 1–22. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  19. 19.
    de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: Ning, P., Atluri, V., Gligor, V.D., Mantel, H. (eds.) FMSE, pp. 71–80. ACM (2007)Google Scholar
  20. 20.
    Ribeiro, C., Ferreira, P.: A policy-oriented language for expressing security specifications. International Journal of Network Security 5(3), 299–316 (2007)Google Scholar
  21. 21.
    Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Proc. of NDSS (2001)Google Scholar
  22. 22.
    Room, S.I.I.R.: XML Firewall Architecture and Best Practices for Configuration and Auditing (2007), http://www.sans.org/reading_room/whitepapers/firewalls/xml-firewall-architecture-practices-configuration-auditing_1766
  23. 23.
    Serban, C., Zhang, W., Minsky, N.: A decentralized mechanism for application level monitoring of distributed systems. In: 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, pp. 1–10. IEEE (2009)Google Scholar
  24. 24.
    Singhal, A., Winograd, T., Scarfone, K.: Guide to Secure Web Services. NIST PublicationGoogle Scholar
  25. 25.
    Song, E., Reddy, R., France, R.B., Ray, I., Georg, G., Alexander, R.: Verifiable composition of access control and application features. In: Ferrari, E., Ahn, G.J. (eds.) SACMAT, pp. 120–129. ACM (2005)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • Matteo Dell’Amico
    • 1
  • Gabriel Serme
    • 2
  • Muhammad Sabir Idrees
    • 1
  • Anderson Santana de Olivera
    • 2
  • Yves Roudier
    • 1
  1. 1.EurecomSophia-AntipolisFrance
  2. 2.SAP ResearchSophia-AntipolisFrance

Personalised recommendations