POLICY MEETING
June 2, 1999
3085 ENG II
3:15-4:15
In attendance:
Karl Levitt (KL), Jim Hoagland (JH), Michael Gertz (MG), Kimberly Knowles
(KK), Premkumar Devanbu (PD)
General News
Negotiating Software Requirements - Apply it to Security Policies
Policy at the Meta Level
Direction for Policy Group
-
General News
-
PD: John Knight is interested in working with us.
-
Sami may fund our proposal
-
Invite more "children" to the Policy group - Chris Wee, Mark Heckman, Dave
Peticolas, Nicole Carlson, Jason Schatz, Brant Hashii, Todd Heberlein,
Aaron Keen
-
KL: Baiju from Intel is interested in our policy work - Steven Templeton,
Christina Chung and Jim Hoagland's work on more unifying view of policies.
-
Should submit UML proposal elsewhere. Other reviewers like it, but Theresa
killed it.
-
Negotiating Software Requirements - Apply it to Security Policies
-
KL: You have a requirements engineer and a requirements customer - ask
leading questions to determine needs of customer, in a semi-formal way,
possibly using decision tables
-
Apply this method to security policies
-
Cost of particular policies, trade-offs, real-time, organizations struggle
with security policy
-
Nick Puketza and Scott Miller are looking at this approach for National
Semiconductor
-
How to take policies and enforce them
-
Exposing some issues, but not technical
-
MG: Database - Reliability and Availability Definitions - Math measurements
-
Specifications of a system - monitor and compare them
-
Specifications in terms of components system, possible response. Abstract
specification of system, otherwise impossible.
-
KL: LaPrie specified vocabulary for transaction systems. John Knight -
formality
-
MG: Describe the expected behavior of a system.
-
Policy at the Meta Level
-
PD: Policy language should be at the Meta level rather than the Object
level.
-
PD: Policy affects behavior of interpretator. The policy changes the semantics
of programs and changes operation semantics
-
Ex. Proxing policy or sandboxing - simulator
-
MG: Policy is then applied to all programs - applied differently to different
programs
-
MG: Where is the meta located?
-
KL: Compositional policies - where you can combine policies MG: Generalization
-
MG: From a database perspective, there are integrity constraints that are
correct/incorrect - reactive. Can't specify integrity without a schema.
Talk at the abstract level, program or component.
-
KL: No structure - confidentiality and availability constraints
-
Mirose - resource allocation in Raju's model, mobile code
-
CPU access - as a resource for scheduling - what mobile code can do. More
than program processes that migrate.
-
MG: Components interact - combine them.
-
KL: Availability related to process hogging resources. Confidentiality
- access control, influence models.
-
KL: Commercial opportunities - what policy want/tradeoff
-
Direction for Policy Group
-
PD: General issue, improve techniques, formal specification of policies?
Implementation strategies? How to extend policy languages?
-
KL: There is a gap between the hard stuff and policy needs. Struggle with
interesting language to express.
-
PD: No good implementation techniques?
-
KL: The basic model is okay, discretionary access, Chinese wall, categorize
policy, non-interference.
-
PD: Policy Example - Make contact to buy something, promise to hold it
for 3 weeks, electronic contract policy - database constraint - certain
transactions are allowed, not allowed. Or is it only a security policy
if the big 4 are involved: Privacy, integrity, authenticity
-
KL: Are we attacking system specifications? Too broad.
-
PD: Meta model - resource and operations, when to allow actions
-
MG: Just talk about services and actions, but no resources
-
KL: Tray specification (Prelim question) For any sequence of actions, is
it legal? What is the value? It doesn't deal with obligations if its good
of obligation
-
PD: Transaction logic - Michael Keifer.
-
KL: LaSCO looking at access control - operations that are allowed as a
function of the statement. Enforceable policy within implementation
-
PD: No good examples. Problems are not clear. We can do theoretical work,
but…
-
KL: Distribution of patches example at the Seclab
-
How do we state policy in terms of the transaction model?
-
MG: All or nothing principle - something you can enforce. Install it nowhere.
-
KL: Express in terms of transactions. Is that a good idea? Reason about
policy, completeness, enforcement, performance, tradeoffs, expressability.
-
KL: Event model
-
MG: Transactions - operational - pre/post conditions
-
KL: 1970s issue is still an issue today.
-
PD: Take language semantics - see how to apply to policy
-
KL: Like liveness? Useful to do. Ideal thing would be a vocabulary or a
database of properties
-
MG: Common terminology. In medicine, it's well established.
-
PD: Meta model with Ariel and LaSCO
-
JH: The University of Idaho has a webpage of security term definitions.
-
PR: ZED, VDM, used for safety critical systems. Declarative specifications.
OCL - Object Constraint Language. Betty Chang
-
KL: Get group together to discuss policies; specify within framework.
-
PD: Security policies in OCL or UML. Model formal language - use to specify
security policies. Jason is interested in UML.