POLICY GROUP MEETING
November 11, 1998
10:00 – 11:00
3085 ENG II

In attendance:
Karl Levitt, Michael Gertz, Premkumar Devanbu, Jim Hoagland, Scott Miller, Brant Hashii, Dan Zerkle


    1) New BAA #99-10 Inherent Information Survivability
            a) Try to complete the abstract (5 pages) in one week
            b) Incorporate student(s) work
                    i) Scott – filtering routers
                    ii) Jim –Access Control LaSCO
                    iii) Brant – Examples from Ariel project
            c) Address Strategic Intrusion Assessment and Data Integrity portions of proposal
            d) Team with TIS or BOEING as consultants
            e) Ideas for Proposal
                    i) Proposal should be more research-oriented
                    ii) Top --> Down Approach
                    iii) Develop policy language
                    iv) Dynamic systems – need event-based and policy-based support
                    v) Monitoring simple and composed events
                    vi) Need a definition of ‘event’
                    vii) Temporal quantifiers
                            (1) Temporal Language – extend expressability
                    viii) Interval Logics
                    ix) Robert Allen 1983 Reasoning Meta Policy
            f) BOEING – liveness properties
                    ) Extensibility – HOL – too academic?
                    ii) Theorem proving

    2) Future Meetings
            a) Policy Meetings
                    i) Discuss Policy Issues
                    ii) Discuss Existing Work
                    iii) Critique each other’s work/papers
                    iv) Discuss Papers
            b) Next Policy Meeting 11:00-12:00 Tuesday, November 17 3085 ENG II
                    i) Dan Zerkle will discuss ADAGE – An Architecture for Distributed Authorization
            c) Proposal Meeting 12:00-1:00 Tuesday, November 17 3085 ENG II
                    i) List features
                    ii) Determine how to proceed on BAA
                    iii) List/incorporate examples

    3) Creation of Bibliography for Policy Papers
            a) Policy Bibliography will be put on-line
            b) Policy Papers will be available in Security Lab 2 (2244 ENG II)