Abstract
Rule-based systems in networking control access for various resources and usually are statically configured. Dynamic service creation and preparedness for the unexpected require possibility to update rules at run-time without loss of performance. This is possible with our event oriented programmable model, where rule designer does not need to care about obsolete rules; conflicts between new rules and installed rules are resolved automatically. Synchronisation between rule designer and current state of installed rules is based on self-organisation property of FGK algorithm that can be used without any modificatioins.
Research outlined in this paper is partially funded by project SOPHIE – Self Organised
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Arens, Y., Rosenbloom, P. (eds.): Responding to the unexpected. Report of the Workshop, New York, N,Y., Feb. 27 – Mar. 1 (2002), URL, http://crue.isi.edu/research/report.html
Damianou, N., Dulay, N., Lupu, E., Sloman, M., Ponder: A Language for Specifying Security and Management Policies for Distributed Systems, The Language Specification Version 2.3, Imperial College Research Report DoC 2000/1, October– 20 (2000), URL, http://www-dse.doc.ic.ac.uk/policies
Ferraiolo, D.F., Sandhu, R., Serban, G., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security 4(3) (August 2001), http://www.list.gmu.edu/journal_papers1.htm
Lupu, E., Sloman, M.: Conflicts in Policy-based Distributed Systems Management. IEEE Transactions on Software Engineering 25(6), 852–869 (1999); special Issue on Inconsistency Management, URL: http://www-dse.doc.ic.ac.uk/~mss/emil/tse.pdf
The CIM Tutorial, Distributed Management Task Force, Inc. (2003), URL, http://www.dmtf.org/education/cimtutorial/index.php
Smirnov, M.: Security Considerations and Models for Service Creation in Premium IP Networks. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 51–63. Springer, Heidelberg (2001)
Lelewer, D., Hirschberg, D.: Data Compression, http://www1.ics.uci.edu/~dan/pubs/DataCompression.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Smirnov, M. (2003). Rule-Based Systems Security Model. In: Gorodetsky, V., Popyack, L., Skormin, V. (eds) Computer Network Security. MMM-ACNS 2003. Lecture Notes in Computer Science, vol 2776. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45215-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-45215-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40797-3
Online ISBN: 978-3-540-45215-7
eBook Packages: Springer Book Archive