Loading...

Cooperative security administration in multi-security-domain environments using a variant of deontic logic

Amini, M ; Sharif University of Technology | 2012

1328 Viewed
  1. Type of Document: Article
  2. DOI: 10.1016/j.scient.2011.10.004
  3. Publisher: 2012
  4. Abstract:
  5. The decentralized approach to security administration in new computing environments (e.g., pervasive computing and mobile environments) is based on apportioning the environment into multiple security domains. The security policies of each security domain are specified by an authority and enforced by a security agent. The requirements of cooperative administration in such Multi-Security-Domain (MSD) environments, for shared or subdomains, induced us to propose an MSD cooperation framework within a logical security policy language (called MASL) in this paper. MASL is a variation of deontic logic that enables multiple authorities to specify their domain policies, including obligations and authorizations. The proposed supplement to MASL, as a calculus of cooperative administration, enables the security agents to infer applicable policy rules of cooperative domains from the policy rules of the participating domains. The calculus offers three styles of cooperative administration, namely collaborative, disjunctive, and delegative. The syntax, semantics, proof theory, soundness and completeness proofs of the core MASL and its supplement are formally presented in this paper. The main advantages of the proposed logical approach in cooperative administration of MSD environments are its abstraction, expressiveness, scalability, and applicability, and automated inference of the cooperative domains' policies
  6. Keywords:
  7. Computing environments ; Cooperative domains ; Decentralized approach ; Deontic Logic ; Logical approaches ; Mobile environments ; Multi-security-domain environment ; Multiple securities ; Policy rules ; Proof theory ; Security administration ; Security agents ; Security domains ; Security model ; Security policy ; Soundness and completeness ; Sub-domains ; Calculations ; Formal logic ; Security systems ; Semantics ; Ubiquitous computing ; Access control ; Authoritarianism ; Decentralization ; Environmental policy ; Language ; Logistics ; Participatory approach ; Policy implementation ; Security
  8. Source: Scientia Iranica ; Volume 19, Issue 3 , June , 2012 , Pages 635-653 ; 10263098 (ISSN)
  9. URL: http://www.sciencedirect.com/science/article/pii/S1026309812000363