Incremental update of constraint-compliant policy rules

Authors

  • Paolo Bottoni Sapienza University of Rome - Department of Computer Science
  • Andrew Fish School of Computing, Engineering and Mathematics, University of Brighton, UK
  • Francesco Parisi Presicce Sapienza University of Rome - Department of Computer Science

DOI:

https://doi.org/10.14279/tuj.eceasst.39.651

Abstract

Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modifications of constraints, by identifying which components of the rule have to be updated. Moreover, we show the construction of sets of rules, directly derived from a positive constraint, to guarantee constraint preservation and constraint enforcement.

Downloads

Published

2011-09-20

How to Cite

[1]
P. Bottoni, A. Fish, and F. Parisi Presicce, “Incremental update of constraint-compliant policy rules”, eceasst, vol. 39, Sep. 2011.