Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modifications of constraints, by identifying which components of the rule have to be updated. Moreover, we show the construction of sets of rules, directly derived from a positive constraint, to guarantee constraint preservation and constraint enforcement.
|Number of pages||18|
|Journal||Electronic Communications of the EASST|
|Publication status||Published - 2010|
Bottoni, P., Fish, A., & Parisi-Presicce, F. (2010). Incremental update of constraint-compliant policy rules. Electronic Communications of the EASST, 39, 1-18. http://journal.ub.tu-berlin.de/eceasst/article/view/651