Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing 2011
DOI: 10.4108/icst.collaboratecom.2011.247119
|View full text |Cite
|
Sign up to set email alerts
|

Ontology-based Policy Anomaly Management for Autonomic Computing

Abstract: Abstract-The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services.Moreover, designing and managing different types of policies collaboratively in such a computing environment are critical but often error prone due to the complex nature of policies as well as the lack of effective analy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0
1

Year Published

2012
2012
2017
2017

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 15 publications
(21 reference statements)
0
4
0
1
Order By: Relevance
“…Hu [43] proposed to divide the five-tuple decision spaces into disjoint hyper-rectangles where conflicts are resolved using a combination of automatic strategies and manual administrator effort driven by risk analysis considerations. A completely different approach is presented by Bandara, that uses argumentation logic and achieves excellent performance [44], and Hu that introduced an ontology-based anomaly management framework that delegates set operation to BDDs [45].…”
Section: Related Workmentioning
confidence: 99%
“…Hu [43] proposed to divide the five-tuple decision spaces into disjoint hyper-rectangles where conflicts are resolved using a combination of automatic strategies and manual administrator effort driven by risk analysis considerations. A completely different approach is presented by Bandara, that uses argumentation logic and achieves excellent performance [44], and Hu that introduced an ontology-based anomaly management framework that delegates set operation to BDDs [45].…”
Section: Related Workmentioning
confidence: 99%
“…The query in Fig. 6 uses FILTER with multiple conditions (line [11][12][13][14]. The first conjunctive condition states that for an obligation to be pending, there should not exist a triple stating its performer agent (!bound(?performerAgent)) meaning that the obligation has not been performed.…”
Section: A Fulfilled and Pending Obligationsmentioning
confidence: 99%
“…the most restricted case for the combination of multiple sets of obligations). However, more complicated cases of combining multiple sets of obligations, such as when there are conflicts among obligations (as described in [14]), or a subset of obligations defined in the φ formula are linked to an access request, are out of the scope of this paper.…”
Section: B Access Request Compliancementioning
confidence: 99%
“…This has a number of limitations: (i) it leads to ad-hoc reasoning about policy compliance, one which is tied to the specific vocabularies that express the rules according to which the reasoning takes place; (ii) it limits the reusability and portability of policies; (iii) it precludes the identification of inter-policy relations; (iv) it limits the ability to perform policy governance. In order to overcome such limitations, semanticallyrich approaches to the specification of policies have been brought to the attention of the research community [17,32,40]. These generally embrace Semantic Web representations for capturing what we term action-oriented policies, i.e.…”
Section: Related Workmentioning
confidence: 99%