A Posteriori Compliance Control

Sandro Etalle, William H. Winsborough

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    47 Citations (Scopus)
    351 Downloads (Pure)

    Abstract

    While preventative policy enforcement mechanisms can provide theoretical guarantees that policy is correctly enforced, they have limitations in practice. They are inflexible when unanticipated circumstances arise, and most are either inflexible with respect to the policies they can enforce or incapable of continuing to enforce policies on data objects as they move from one system to another. In this paper we propose an approach to enforcing policies not by preventing unauthorized use, but rather by deterring it. We believe this approach is complementary to preventative policy enforcement. We call our approach APPLE for A-Posteriori PoLicy Enforcement. We introduce APPLE Core, a logical framework for using logs to verify that actions taken by the system were authorized. A trust management system is used to ensure that data objects are provided only to users operating on auditable systems who are subject to penalty should they be found in violation. This combination of audit and accountability provides a deterrence that strongly encourages trustworthy behavior, thereby allowing a high level of assurance of end-to-end policy enforcement.
    Original languageUndefined
    Title of host publication12th ACM Symposium on Access Control Models and Technologies (SACMAT)
    Place of PublicationNew York
    PublisherACM Press
    Pages11-20
    Number of pages10
    ISBN (Print)978-1-59593-745-2
    DOIs
    Publication statusPublished - Jun 2007
    Event12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007 - Nice, France
    Duration: 20 Jun 200722 Jun 2007

    Publication series

    Name
    PublisherACM Press
    Number2

    Conference

    Conference12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007
    Period20/06/0722/06/07
    Other20-22 June 2007

    Keywords

    • CR-D.4.6
    • SCS-Cybersecurity
    • EWI-9652
    • IR-67058
    • METIS-241576

    Cite this