POLICY MEETING
June 30, 1999
3085 ENG II
3:00-4:00pm
In attendance:
Dave Peticolas (DP), Mark Heckman (MH), and Brant Hashii (BH)
- Edjlali: History Based Access Control for Mobile Code
- BH: Mobile code is any code that can migrate (Java, PS)
- Paper is about classifying programs by behavior
- History of Normal behavior
- Can only access network or the disk - not both
- Prevents information flow.
- History - Security Events invoke handles - set a bit that it has been accessed
- Policy - not looking at previous histories or full histories
- Written in Java - programmable policy
- Limited number of action - security events are binary
- Access to specific files
- Similar to Ariel Project
- Definitions of policy
- Information flow policy
- Temporal Policy
- General Composition Policy - McLean
- Non-interference - Goguen - SRL
- High level never interferes with low level
- Restrictivness of composable policy - useless in practice
- Hosmer - Metapolicies and Metapolicies II
- Current framework for security policy - need an overarching policy for all domains when you integrate information from other companies/government
- Conflicts between policies
- Multipolicy machine - abstract and fluffy - speculation; can be changed/flexible
- Takes all policies, machine decides which policy takes precedence
- Metapolicies II
- Different kinds of metapolicies - most implicit
- Metapolicy descriptions - components (name, type, change process)
- Constraints - domain object
- Message: Metapolicy should be made explicit
- Paper doesn't talk about comparing two completely different systems
- No tools for analyzing policies