(Khoury and Tawbi, 2012), (Basin et. al, 2013).
How these enforcement mechanisms can be applied
to this work and finding out the set of enforceable
actions will set a possible future direction of our
research.
7 CONCLUSIONS
In this paper we have derived the set of mutually
exclusive and exhaustive security requirements. To
find that out basic notion of process algebra has been
taken. We proposed novel method for describing
low level security policies, dealing with the legality
of actions by a process. Basic security rules of the
policies like Permission, Prohibition and Obligation
are explored. Some examples of formulation of high
level security policies in terms of low level policies
are given in the appendix. The mechanism to get the
effective set of permitted actions complying with all
the applicable security policies at a point in time is
mentioned in this paper. Non-compliance to these
low-level policies is taken as security violation. We
have tried to find out all the possible security
violations. The requirements corresponding to these
security violations are expected to be necessary and
sufficient for a system of processes to maintain
security. This paper also tried to find the dependency
of one security requirement on another and have
found the conjugate pairs among them. The
approach has been illustrated by a running example
of interactions between a server and the attached
network.
Our future work includes how this study can be
applied to different cases of security analyses, like in
risk, threat or attack analysis. With mutually
exclusive and exhaustive set of security
requirements in hand, it is expected to get a better
formal view of security analysis. How to monitor or
enforce security requirements is another possible
area of research. Designing the set of security
controls for a system with optimal usage of
resources is yet another future challenge. It seems,
security policy generation may be done in more
formal way, by using this set of mutually exclusive
and exhaustive security
requirements, which needs
further attention
.
ACKNOWLEDGEMENTS
This research was partially supported by grants
allocated by the Department of Electronics and
Information Technology, Govt. of India. We wish to
thank anonymous reviewers, there comments come
extremely helpful to articulate the ideas and shape
the illustrations.
REFERENCES
Milner, R., 1989. Communication and Concurrency.
Prentice-Hall International.
Damianou, N., Dulay, N., Lupu, E., Sloman, M., 2001. the
Ponder Policy Specification Language. in Proceedings
of the International Workshop on Policies for
Distributed Systems and Networks. Springer-Verlag.
Cuppens, F., Cuppens-Boulahia, N., Sans, T., 2005.
Nomad: A Security Model with Non Atomic Actions
and Deadlines. in the Computer Security Foundations
Workshop (CSFW).
Jajodia, S., Samarati, P., Sapino, M. L., Subrahmanian, V.
S., 2001. Flexible Support for Multiple Access Control
Policies. in ACM Transactions on Database Systems
(TODS), V.26 N.2, P.214-260.
Mayfield, T., Roskos, J. E., Welke, S. R., Boone, J. M.,
Mcdonald, C. W., 1991. Integrity in Automated
Information Systems. C Technical Report 79-91,
Library No. S-237,254 (IDA PAPER P-2316).
Biba, K. J., 1977. Integrity Considerations for Secure
Computer Systems. Mitre TR-3153, Mitre
Corporation, Bedford, MA.
Alpern, B., Schneider, F. B., 1985. Defining Liveness. in
Information Processing Letters, 21(4):181-185.
Mclean, J., 1994. a Generai Theory of Composition for
Trace Sets Closed under Selective Interleaving
Functions. in Proceedings of the 1994 IEEE
Symposium on Security and Privacy, Pages 79-93.
IEEE Press.
Zakinthinos, A., Lee, E. S., 1998. A General Theory of
Security Properties and Secure Composition. in
Proceedings of the 1997 IEEE Symposium on
Research in Security and Privacy. IEEE Press.
Mccullough, D., 1987. Specifications for Multi-Level
Security and a Hook-up Property. in Proceedings of
the 1987 IEEE Symposium on Research in Security
and Privacy. IEEE Press.
Clarkson, M. R., Schneider, F. B., 2010(a). Quantification
of Integrity. in Proc. 23nd IEEE Computer Security
Foundations Symposium (CSF ’10), Pp. 28–43.
Clarkson, M. R., Schneider, F. B., 2010(B).
Hyperproperties. Journal of Computer Security,
18(6):1157–1210.
Schneider, F. B., 2000. Enforceable Security Policies.
ACM Trans. on Information and System Security. 3, 1.
Ligatti, J., Bauer, L., Walker, D., 2005. Edit Automata:
Enforcement Mechanisms for Run-Time Security
Policies. International Journal of Information Security
4(1-2), 2–16.
Khoury, R., Tawbi, N., 2012. Which Security Policies Are
Enforceable by Runtime Monitors? a Survey.
Computer Science Review 6(1), 27–45.
ANovelModelofSecurityPoliciesandRequirements
81