Information Technology Reference
In-Depth Information
(ag in act1.agent) and
(act1 type Read) and
(act2 in BLPpolicy.domain.activity) and
(p in act2.object) and
(ag in act2.agent) and
(act2 type Write) and
not(o.securityclass lowerEqual
p.securityclass))
==> (StarProperty in FailedRule)
$
END
Domain
Each policy has a range of applicability, called its “security domain”. In addition,
policies incorporate a model of the corresponding security domain. In the SPR, the
security domain model comprises of the following interrelated elements:
Objects
,
Agents
and
Activities
. Objects are resources controlled by the policy. They are the
assets of the information system, which need protection and include data, software,
and hardware assets. In order to allow for policies following different paradigms to be
represented in the SPR, we have included two more related concepts:
Subjects
and
Roles
.
Subjects
refer to acting entities, usually people, or processes that act on behalf of
some people.
Roles
are abstract descriptions of entities, such as managers, doctors,
nurses, etc. Usually, role-based policies provide rules for deciding whether a subject
should be assigned a role at a particular situation.
Agents
are subjects that have been assigned a role, thus being a more abstract con-
cept. Therefore, an agent can be equivalent to a role if it refers to any subject assum-
ing this role and on the other hand an agent can be equivalent to a subject if it refers to
that subject regardless of the roles it has been assigned to. Agents are hierarchically
structured with the isA relationship. For example, if
nurse
is an agent name, then we
may declare that
ward-A nurse
isA
nurse
and, automatically, all rules regarding
nurses will also apply to the ward-A
nurse
.
Activities
are performed by agents and use objects (i.e. resources). Activities can be
as general as “managing a hospital” or as concrete as “read-access” of a subject to an
object. In the latter case, activities are equivalent to actions. The basic conceptual
model of the SPR is presented in Fig. 2.
5
Conflict Management Strategies
Conflict management comprises of a) conflict detection and b) conflict resolution. It
can be realized through the following steps:
1. Resolution of conflicting objectives.
2. Semantic heterogeneity resolution.
3. Resolution of domain overlapping.
4. Antagonism reconciliation.