Incremental update of constraint-compliant policy rules

P. Bottoni, Andrew Fish, F. Parisi-Presicce

Research output: Contribution to journalArticlepeer-review

Abstract

Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modifications of constraints, by identifying which components of the rule have to be updated. Moreover, we show the construction of sets of rules, directly derived from a positive constraint, to guarantee constraint preservation and constraint enforcement.
Original languageEnglish
Pages (from-to)1-18
Number of pages18
JournalElectronic Communications of the EASST
Volume39
Publication statusPublished - 2010

Fingerprint

Dive into the research topics of 'Incremental update of constraint-compliant policy rules'. Together they form a unique fingerprint.

Cite this