零信任安全策略的运行时模型检查方法

Zhi Niu, Luming Dong, Yong Zhu
{"title":"零信任安全策略的运行时模型检查方法","authors":"Zhi Niu, Luming Dong, Yong Zhu","doi":"10.1145/3558819.3558821","DOIUrl":null,"url":null,"abstract":"The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.","PeriodicalId":373484,"journal":{"name":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Runtime model checking Method for Zero Trust Security Policy\",\"authors\":\"Zhi Niu, Luming Dong, Yong Zhu\",\"doi\":\"10.1145/3558819.3558821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.\",\"PeriodicalId\":373484,\"journal\":{\"name\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 7th International Conference on Cyber Security and Information Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3558819.3558821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th International Conference on Cyber Security and Information Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3558819.3558821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

策略管理员是一个零信任的动态权限确定组件,主要负责策略的管理、存储和评估。针对策略管理员中策略的安全性和有效性评估问题,提出在策略管理员中引入策略模型在线服务验证组件。首先通过逻辑抽象将策略文件形式化为策略实例逻辑规范,然后策略实例逻辑规范与策略设计者开发的策略抽象逻辑规范进行模型检查,实现对策略文件一致性的预检查验证。在完成预检查和验证后,将执行策略,以便策略管理器对策略的执行点做出决策。此时,利用策略实施点截获的系统运行状态数据和嵌入式系统的安全性、合规性、法律条约形式流程规范进行模型后检,实现策略实施后的安全性和报警。通过事前检查和事后检查相结合,最终实现了对策略和零信任安全策略有效性的评估和测试。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
The Runtime model checking Method for Zero Trust Security Policy
The policy administrator is a zero trust dynamic authority determination component, which is mainly responsible for the management, storage and evaluation of policies. Aiming at the evaluation of the security and effectiveness of the policies in the policy administrator, this paper proposes to introduce the policy model online service verification component in the policy administrator. First, the policy file is formalized into a policy instance logic specification through logical abstraction, and then the policy instance logic specification Perform model check with the policy abstract logic specification developed by the policy designer to realize the pre-check verification of the consistency of the police file. After the completion of the pre-check and verification, the policy will be executed for the policy manager to make a decision on the execution point of the policy. At this time, the system operating state data intercepted by the policy enforcement point and the embedded system's security, compliance, and legal treaty form process specifications are used to perform model post-check to achieve the security and alarm after the implementation of the policy. Through the combination of pre-check and post-check, the evaluation and testing of the policy and effectiveness of the zero-trust security policy are finally realized.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Development and Application of Portable Multi-Function Power Distribution Emergency Repair Standardized Equipment Research on Automatic Self-healing Control of Intelligent Feeder based on Multi-Agent Algorithm Research and implementation of IP address management in medium and large-scale local area networks Application of Compressive Sensing Technology and Image Processing in Space Exploration House Price Prediction Model Using Bridge Memristors Recurrent Neural Network
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1