POLICY MEETING
June 9, 1999
3085 ENG II
3:15-4:15
In attendance:
Karl Levitt (KL), Jim Hoagland (JH), Michael Gertz (MG), Kimberly Knowles
(KK), Christina Chung (CC), Brant Hashii (BH), Dave Peticolas (DP), Aaron
Keen (AK), Mark Heckman (MH), Jason Schatz (JS)
-
Goals of Policy Group
-
KL: New BAAs from DARPA on policy this summer.
-
KL: Policy is inherent in all computer security research. Jim Moore states
that if there is no policy, the system won't enforce it.
-
KL: Interested in Examples
-
At the seminar today, Paul McNabb talked out trusted operating systems.
The goal was to take a mandatory policy, compile it into the operating
system kernel, reference monitor - statistically and dynamically update
the policy. Trusted pipelines - forwarding chains that each person must
sign. It wasn't clear which policy was enforced.
-
MG: Don't want to recompile the kernel all the time.
-
KL: Todd Heberlein asked why do it in a kernel when you can do it in an
IDS?
-
MG: Interested in specifying policies in OCL
-
Direction for Policy Group
-
Read Policy papers - is OCL a good vehicle for policy. Summarize several
at meetings 5-10 minutes each
-
Prepare for Proposals that will be due in July or August.
-
Christina and Kimberly will not be here for the summer, but Dave, Aaron,
Mark, Jason and Jim will be here.
-
Categorization of Policy Papers
-
MG: Describe a set of features of each language
-
JS: Categorize the expressiveness of languages
-
KL: Look at examples; Describe obligations of deonitic language
-
We'll meet again in two weeks to discuss papers.