Expressive security policy rules using layered conceptual graphs
Expressive security policy rules using layered conceptual graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language that will allow us to represent the structure of information and to employ reasoning for consistency checking. We motivate our choice of language by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities. We explain our approach in the context of security requirements for medical systems. We evaluate our work theoretically, by means of an example of a real world policy rule.
conceptual graphs, layered conceptual graphs, policy rules
209-216
Croitoru, Madalina
4a2ca559-8d8f-4b3d-8622-c2f83796dadc
Xiao, Liang
bb4e3fd9-f69e-4bdc-aad8-6eecbe58c8c6
Dupplaw, David
c563ca2b-756a-4d3f-bf99-4f60bb2be1ce
Lewis, Paul
7aa6c6d9-bc69-4e19-b2ac-a6e20558c020
April 2008
Croitoru, Madalina
4a2ca559-8d8f-4b3d-8622-c2f83796dadc
Xiao, Liang
bb4e3fd9-f69e-4bdc-aad8-6eecbe58c8c6
Dupplaw, David
c563ca2b-756a-4d3f-bf99-4f60bb2be1ce
Lewis, Paul
7aa6c6d9-bc69-4e19-b2ac-a6e20558c020
Croitoru, Madalina, Xiao, Liang, Dupplaw, David and Lewis, Paul
(2008)
Expressive security policy rules using layered conceptual graphs.
[in special issue: The 27th SGAI International Conference on Artificial Intelligence]
Knowledge-Based Systems, 21 (3), .
(doi:10.1016/j.knosys.2007.11.006).
Abstract
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language that will allow us to represent the structure of information and to employ reasoning for consistency checking. We motivate our choice of language by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities. We explain our approach in the context of security requirements for medical systems. We evaluate our work theoretically, by means of an example of a real world policy rule.
Text
Expressive_Security_policypdf.pdf
- Version of Record
Restricted to Repository staff only
Request a copy
More information
e-pub ahead of print date: 23 November 2007
Published date: April 2008
Venue - Dates:
The Twenty-seventh SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence (AI'07), 2007-11-23
Keywords:
conceptual graphs, layered conceptual graphs, policy rules
Organisations:
Web & Internet Science
Identifiers
Local EPrints ID: 265637
URI: http://eprints.soton.ac.uk/id/eprint/265637
PURE UUID: c4b73974-3186-46b4-9827-0a1efc0833f7
Catalogue record
Date deposited: 28 Apr 2008 15:37
Last modified: 14 Mar 2024 08:11
Export record
Altmetrics
Contributors
Author:
Madalina Croitoru
Author:
Liang Xiao
Author:
David Dupplaw
Author:
Paul Lewis
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics