skip to main content
10.1145/1719030.1719035acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

What is the shape of your security policy?: security as a classification problem

Authors Info & Claims
Published:08 September 2009Publication History

ABSTRACT

This new paradigm defines security policies on cause-effect relations and models security mechanisms in analogy with pattern recognition classifiers. It augments the arsenal of formal computer security evaluation tools with new techniques. A causality model represents possible causes and effects; the causes include threats and the effects may be undesired. Target security policies derived from functional specifications select permitted causalities. Security mechanisms extract features from causes and effects and enforce mechanism-specific policies, approximating the target policy. Advantages of the classifier paradigm are the ability to generalize from incomplete information and examples, to measure classification error and mechanism performance, and to analyze mechanism ensembles and compositions. The classifier paradigm also offers a conception of problem complexity and suggests paying more attention to the impact of mechanisms rather than to their inner workings.

References

  1. Ross Anderson. Why cryptosystems fail. In CCS '93: Proceedings of the 1st ACM conference on Computer and communications security, pages 215--227, New York, NY, USA, 1993. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ross J. Anderson. Security Engineering: A guide to building dependable distributed systems. Wiley, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Mitra Basu and Tin Kam Ho, editors. Data complexity in pattern recognition. Springer-Verlag New York Inc, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. David Elliot Bell. Looking back at the Bell-La Padula model. In Proceedings of the 21st Annual Computer Security Applications Conference, pages 337--351. IEEE Computer Society Washington, DC, USA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Common criteria for information technology security evaluation v3.1. available online, http://www.commoncriteriaportal.org/, 2006.Google ScholarGoogle Scholar
  6. Menahem Friedman and Abraham Kandel. Introduction to pattern recognition: statistical, structural, neural and fuzzy logic approaches. World scientific, 1999.Google ScholarGoogle Scholar
  7. Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Commun. ACM, 19(8):461--471, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mikko Hypponen. 21 Solutions to Save the World: Masters of Their Domain. Foreign Policy, May/June, 2007.Google ScholarGoogle Scholar
  9. A. K. Jain, R. P. W. Duin, and Jianchang Mao. Statistical pattern recognition: a review. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 22(1):4--37, Jan 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Kittler, M. Hatef, R. P. W. Duin, and J. Matas. On combining classifiers. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 20(3):226--239, Mar 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Kittler, M. Hatef, and Duin R. P. W. Combining classifiers: A theoretical framework. Pattern Analysis & Applications, 1(1):18--27, 1998.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nikunj C. Oza and Kagan Tumer. Classifier ensembles: Select real-world applications. Information Fusion, 9(1):4--20, 2008. Special Issue on Applications of Ensemble Methods. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. U. Priss. Formal concept analysis in information science. Annual review of information science and technology, 40(1), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, 1975.Google ScholarGoogle ScholarCross RefCross Ref
  15. Frank Swiderski and Window Snyder. Threat Modeling. Microsoft Press, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Whitley and J.P. Watson. Complexity theory and the no free lunch theorem. Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, page 317, 2005.Google ScholarGoogle Scholar
  17. D. H. Wolpert and W. G. Macready. No free lunch theorems for search. Technical report, Technical Report SFI-TR-95-02-010, Santa Fe Institute, 1995.Google ScholarGoogle Scholar
  18. Xerox workcentre/workcentre pro 232/238/245/255/265/275 multifunction systems security target. available online, http://www.commoncriteriaportal.org/files/epfiles/ST_VID10135-ST.pdf, 2005.Google ScholarGoogle Scholar
  19. Xerox workcentre/workcentre pro 232/238/245/255/265/275 multifunction systems validation report. available online, http://www.commoncriteriaportal.org/files/epfiles/ST_VID10135-VR.pdf, 2006.Google ScholarGoogle Scholar

Index Terms

  1. What is the shape of your security policy?: security as a classification problem

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Other conferences
                NSPW '09: Proceedings of the 2009 workshop on New security paradigms workshop
                September 2009
                156 pages
                ISBN:9781605588452
                DOI:10.1145/1719030

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 8 September 2009

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate62of170submissions,36%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader