POLICY GROUP MEETING
December 1st, 1998
3085 ENG II
12:00 1:00 pm
In attendance:
Karl Levitt (KL), Premkumar Devanbu (PD), Michael Gertz (MG), Jim Hoagland
(JH), Dan Zerkle (DZ)
TOPICS
DARPA 99-10
Innovative Claims
Tasks
-
DARPA 99-10
-
Policy Language apply it to intrusion detection or data mining
-
DZ: Will rewrite his scenario
-
DZ: Policy statements must be used for intrusion detection, checking or
enforcement
-
Need an explanation of UML and its utilities
-
KL: Define what UML can do, that ADAGE cannot do
-
MG: UML is more expressive
-
KL: UML has tools, ADAGE does not
-
Indicate tools and how theyd be used
-
Innovative Claims 1 page
-
Scalable Design Policy System Integration
-
Limitations of current system, separation of design and policy
-
Leverage existing software and technology
-
Expressive language for policy and systems specification
-
Evaluation: Static, Analysis, Verification, Simulation
-
SE Stuff: Encapsulation, Information hiding
-
Language Features
-
Dynamic Behavior
-
Regular Expression
-
Executable Model
-
Reason About Changes
-
Comparison with Existing Work ADAGE, BAN LOGIC, CORBA, Formal methods
-
Integration of existing work
-
Take existing components and goals; map policy down to wrappers, firewalls,
IDS, agents
-
Contributions to Legacy
-
Model existing system and its component à
evolving
-
Reengineer some existing systems
-
Tasks
-
Extending UML for security using Meta features
-
Model existing systems/components
-
How to model wrapper, router or firewall
-
Legacy components modeling an advantage over ADAGE using FSM, statecharts
-
Map model to mechanism - software
-
Produce Policy Specification
-
Study impact of security policies
-
Adapt and Extend UML Tools
-
Design, Simulation, Analysis
-
Develop UML Security-Centered Methodology