Expertise knowledge-based Policy Refinement Process T. Rochaeli and - - PowerPoint PPT Presentation

expertise knowledge based policy refinement process
SMART_READER_LITE
LIVE PREVIEW

Expertise knowledge-based Policy Refinement Process T. Rochaeli and - - PowerPoint PPT Presentation

Expertise knowledge-based Policy Refinement Process T. Rochaeli and C. Eckert Technische Universitt Darmstadt 25.06.2007 POLICY '07, Bologna, Italy 1 Workflow and Kripke Model Workflow: computerized facilitation or automation of a


slide-1
SLIDE 1

25.06.2007 POLICY '07, Bologna, Italy 1

Expertise knowledge-based Policy Refinement Process

  • T. Rochaeli and C. Eckert

Technische Universität Darmstadt

slide-2
SLIDE 2

25.06.2007 POLICY '07, Bologna, Italy 2

Workflow and Kripke Model

  • Workflow: computerized facilitation or

automation of a business process

  • Kripke model represents the behavior of

workflow

– connected directed graph: nodes are states and edges are state transitions – state: snapshot of the workflow behavior – State transitions: possible next subsequent states – state labels: occurrence of events (i.e. task execution) – Formally, M: (W,R,L) – W, set of states – R ⊂ W x W, set of state transitions – L: W 2AP, labeling function

s1 s2 s3 s4

Submit loan application Check rating Reevaluate application Approve application

slide-3
SLIDE 3

25.06.2007 POLICY '07, Bologna, Italy 3

The Gap between Design and Implementation

  • Caused by the simplification of

workflow design

– Developer assumption: “Everything is just fine…”

  • Model of workflow design

– Consider only task’s execution

  • Model of workflow

implementation

– any other events could also happen (i.e. role activation, user authentication)

  • An example of malicious

execution path (or trace)

– Same role activates two sensitive tasks s1 s2 s3 s4

Submit loan application Check rating Reevaluate application Approve application User activates role A User activates role A

Workflow Design Workflow Implementation

slide-4
SLIDE 4

25.06.2007 POLICY '07, Bologna, Italy 4

State Labels to Represent Security Policy

  • Avoid the malicious execution

path by specifying security policy in the shaded zone:

– The security mechanism (separation of duty) should be applied within this execution path

  • The shaded zone is represented by

additional states label

  • States labels along a fragment of

execution path represent the security policy

Apply separation of duty Malicious execution path

s1 s2 s3 s4

Submit loan application Check rating Reevaluate application Approve application Apply separation of duty Apply separation of duty Apply separation of duty

slide-5
SLIDE 5

25.06.2007 POLICY '07, Bologna, Italy 5

Refining the State Labels

  • Source of the policy refinement

process: abstract policies

– Originated from stakeholders’ protection intent – Abstract state labels

  • Target of the policy refinement

process: concrete policies

– Concrete state labels – Denote the execution path, in which the security mechanism should apply

  • domain experts’ knowledge

is required!

s1 s2 s3 s4

Submit loan application Check rating Reevaluate application Grant application Apply separation of duty Apply separation of duty Apply separation of duty Prevent fraud Prevent fraud Prevent fraud

slide-6
SLIDE 6

25.06.2007 POLICY '07, Bologna, Italy 6

Documenting the Experts’ Knowledge

  • Make use pattern paradigm

– A pattern captures the best-practice solution to a problem in a certain context

  • Three main parts of refinement pattern

– Context: describes the execution path, in which the problem occurs – Problem: describes the abstract state labels – Solution: describes the less abstract state labels that should be defined within the context

  • Formal representation (required for automated refinement process)

– All parts of the pattern are represented by Linear-time Temporal Logic formulas

  • Advantage:

– Effective documentation and transfer of knowledge between domain experts

  • Disadvantage:

– The correctness of refined policies depends on the validity of the patterns

slide-7
SLIDE 7

25.06.2007 POLICY '07, Bologna, Italy 7

An Overview of Expertise Knowledge-based Policy Refinement Process

P1 P3 P2

OR

pattern A ctx sln prb pattern B ctx sln prb

pattern matching pattern matching add new label add new label

Policies represented as tree Policies represented as state labels

slide-8
SLIDE 8

25.06.2007 POLICY '07, Bologna, Italy 8

An Overview of Expertise Knowledge-based Policy Refinement Process

P1 P2 P3

OR

P4

AND

P7 P6

AND

Policies represented as tree Policies represented as state labels

slide-9
SLIDE 9

25.06.2007 POLICY '07, Bologna, Italy 9

Model Checking

  • Objective

– Given a model M and a formula f, retrieve the execution path , which satisfies the formula f – Formally:

  • Model checking as pattern

matching

– Pattern context and problem as formula and – Workflow model M – Find any (finite) execution path satisfying:

  • Main obstacle

– Both sets of atomic propositions use different vocabularies

Kripke model M Syntax rule for constructing LTL formula

slide-10
SLIDE 10

25.06.2007 POLICY '07, Bologna, Italy 10

Description Logic-based Model Checking (I)

  • Idea:

– emulate the CTL* semantics on top of the Description Logic semantics – Use instance checking reasoning

  • Approach

– Define ontology of atomic propositions as a common vocabulary between M and f – Define CTL* semantics on top of description logic semantics – Represent M as individual (instance) assertions – Represent f as concepts (classes) – Perform instance checking CTL* semantics DL semantics DL reasoning engine CTL

Linear-time Temporal Logic (LTL)

CTL*

slide-11
SLIDE 11

25.06.2007 POLICY '07, Bologna, Italy 11

Description Logic-based Model Checking (II)

  • Translated query:

M,σ0 ² f ? : KB ² C(x) ?

  • Legend:

– M : Kripke model – σ0 : first state of the path – f : temporal logic formula – KB: knowledge base – C : concept representing f – x : instance representing σ0

  • Informally:

– Does the path starting from state σ0 of model M fulfill the formula f?

  • – Based on knowledge base KB, is the instance x a member of concept C?
slide-12
SLIDE 12

25.06.2007 POLICY '07, Bologna, Italy 12

Contributions

  • Automated policy refinement process by using expertise knowledge
  • Capturing the expertise knowledge using formalized patterns

– Effectively capture domain experts’ knowledge pertaining to workflow security (finance, healthcare, government, etc.) – The experts’ knowledge can be directly used by the automated refinement process

  • Description logic-based model checking

– Enable model checking in heterogeneous environment (i.e. compliance check of web services behavior against customer policy)

slide-13
SLIDE 13

25.06.2007 POLICY '07, Bologna, Italy 13

End

Thank you!