Policy Technologies for Security Management in Coalition Networks

Policy Technologies for Security Management in Coalition Networks

Seraphin B. Calo (IBM Research, USA), Clare-Marie Karat (IBM Research, USA), John Karat (IBM Research, USA), Jorge Lobo (IBM Research, USA), Robert Craven (Imperial College, UK), Emil Lupu (Imperial College, UK), Jiefei Ma (Imperial College, UK), Alessandra Russo (Imperial College, UK), Morris Sloman (Imperial College, UK) and Arosha Bandara (The Open University, UK)
DOI: 10.4018/978-1-61520-855-5.ch008
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.
Chapter Preview
Top

Framework For Security Policies

Our framework for policy analysis and refinement captures policies at various levels of abstraction (or layers), which identify the key stages in the process of refining policies from goals to implementations. The layered architecture is useful in identifying the architectural elements, software components, and system models that are needed to support the refinement and analysis processes, and to facilitate the management of policies. In this section we describe and illustrate the framework, identifying the levels comprising it and the services that we expect to be able to perform at each level.

Complete Chapter List

Search this Book:
Reset