Skip to main content

Rule-Based Systems Security Model

  • Conference paper
Computer Network Security (MMM-ACNS 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2776))

Abstract

Rule-based systems in networking control access for various resources and usually are statically configured. Dynamic service creation and preparedness for the unexpected require possibility to update rules at run-time without loss of performance. This is possible with our event oriented programmable model, where rule designer does not need to care about obsolete rules; conflicts between new rules and installed rules are resolved automatically. Synchronisation between rule designer and current state of installed rules is based on self-organisation property of FGK algorithm that can be used without any modificatioins.

Research outlined in this paper is partially funded by project SOPHIE – Self Organised

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Arens, Y., Rosenbloom, P. (eds.): Responding to the unexpected. Report of the Workshop, New York, N,Y., Feb. 27 – Mar. 1 (2002), URL, http://crue.isi.edu/research/report.html

  2. Damianou, N., Dulay, N., Lupu, E., Sloman, M., Ponder: A Language for Specifying Security and Management Policies for Distributed Systems, The Language Specification Version 2.3, Imperial College Research Report DoC 2000/1, October– 20 (2000), URL, http://www-dse.doc.ic.ac.uk/policies

  3. Ferraiolo, D.F., Sandhu, R., Serban, G., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security 4(3) (August 2001), http://www.list.gmu.edu/journal_papers1.htm

  4. Lupu, E., Sloman, M.: Conflicts in Policy-based Distributed Systems Management. IEEE Transactions on Software Engineering 25(6), 852–869 (1999); special Issue on Inconsistency Management, URL: http://www-dse.doc.ic.ac.uk/~mss/emil/tse.pdf

    Google Scholar 

  5. The CIM Tutorial, Distributed Management Task Force, Inc. (2003), URL, http://www.dmtf.org/education/cimtutorial/index.php

  6. Smirnov, M.: Security Considerations and Models for Service Creation in Premium IP Networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 51–63. Springer, Heidelberg (2001)

    Google Scholar 

  7. Lelewer, D., Hirschberg, D.: Data Compression, http://www1.ics.uci.edu/~dan/pubs/DataCompression.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Smirnov, M. (2003). Rule-Based Systems Security Model. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45215-7_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40797-3

  • Online ISBN: 978-3-540-45215-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics