Incremental update of constraint-compliant policy rules
DOI:
https://doi.org/10.14279/tuj.eceasst.39.651Abstract
Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modifications of constraints, by identifying which components of the rule have to be updated. Moreover, we show the construction of sets of rules, directly derived from a positive constraint, to guarantee constraint preservation and constraint enforcement.Downloads
Published
2011-09-20
How to Cite
[1]
P. Bottoni, A. Fish, and F. Parisi Presicce, “Incremental update of constraint-compliant policy rules”, eceasst, vol. 39, Sep. 2011.
Issue
Section
Articles