Home
Scholarly Works
Defense in Depth Formulation and Usage in Dynamic...
Conference

Defense in Depth Formulation and Usage in Dynamic Access Control

Abstract

Many network systems secure their resources using a defense in depth strategy, which can result in complex policies being distributed on the many access control points of a network. These policies are subject to frequent changes to deal with different factors such as change in security situation or change in resources. Moreover, while we have a vague intuitive understanding of the defense in depth strategy, we certainly lack a rigorous definition for it that would allow us to objectively assess whether a policy distribution on a network satisfies this strategy. In this paper, we propose a definition for defense in depth based on a notion of refinement given in product family algebra. We use this definition to articulate several implementations of the defense in depth strategy taking into account local access policies and global constraints on the resources of the considered network. We also discuss the automation of the calculations needed to derive the appropriate access policies to deploy at the nodes of a network.

Authors

Khedri R; Jones O; Alabbad M

Series

Lecture Notes in Computer Science

Volume

10204

Pagination

pp. 253-274

Publisher

Springer Nature

Publication Date

January 1, 2017

DOI

10.1007/978-3-662-54455-6_12

Conference proceedings

Lecture Notes in Computer Science

ISSN

0302-9743
View published work (Non-McMaster Users)

Contact the Experts team