DYNAMIC ACCESS CONTROL MANAGEMENT USING EXPERT SYSTEM TECHNOLOGY

Size: px
Start display at page:

Download "DYNAMIC ACCESS CONTROL MANAGEMENT USING EXPERT SYSTEM TECHNOLOGY"

Transcription

1 DYNAMIC ACCESS CONTROL MANAGEMENT USING EXPERT SYSTEM TECHNOLOGY Prof. G. Pangalos G. Vakaros Ms.C. ( [email protected]), Ch. Georgiadis Ph.D. ( [email protected]) Informatics Lab, Faculty of Technology - Aristotle University Of Thessaloniki, 54006, GREECE I. Nestori ([email protected]), K. Kemalis ([email protected]) "ARROW Technologies" s.a. - Leoforos Nikis 3, Thessaloniki, 54624, GREECE Abstract Advances in computer and communication technologies have resulted in highly distributed systems that allow users to access information and resources from all over the globe. This interconnectivity emphasizes the long-standing problem of providing security in a distributed computer system. The protection of sensitive personal data - stored in database systems - from unauthorized access, illegal modification or system failure is a major concern in information systems. In these systems, access control ensures that accesses to the system resources occur according to the modes and rules fixed by the corresponding security policies. A security policy is expressed by access rules, which determine how access permissions are controlled and access decisions determined. Recently there has been significant interest in applying artificial intelligence (AI) techniques to access control problems. The early research efforts realized the inefficiency of any approach which attempted to require a manual review of a system s audit data. While the information necessary to identify unauthorized access was believed to be present within the often-voluminous audit data, an effective review of the material required the use of an automated and self-controlled system. We believe that the use of expert system techniques in access control mechanisms is going to be a significant milestone in the development of effective detection-based information security systems. The goal of our research is to provide a systemindependent mechanism both for prevention and for real-time detection of security violations, whether they are initiated by outsiders who attempt to break into a system or by insiders who attempt to misuse the privileges of their authorized roles on the system. In this paper we present our approach in addressing the above problem. We also describe how rule-based expert systems can be used for implementing and extending the dynamic characteristics (such as the contexts of specific activities, or the collaborative nature of a particular task) of modern access control models. Keywords Security, Dynamic Access Control, Expert System.

2 1. Introduction One of the primary motivations of our work is the need to provide dynamic access control for certain types of enterprise data. Dynamic access control automatically reacts to these changes, allowing access control decisions to take into consideration factors other than the usual subject, object, and permissions typical of standard access control models. Traditional access control models are characterized as passives and they cannot support efficiently the dynamic aspects of modern information systems. In dynamically changing environments there is a need for active security models, which are capable to control permission activation according to the current needto-know requirements of users. In order to address this problem, we propose in this paper the use of expert system technology, as well as the use of the already known Context-based Team Access Control (C-TMAC) security model, in order to take advantage of their dynamic behavior. The extension of the dynamic behavior of the above approach for access control (C-TMAC), using expert system, makes our proposed Control Access Management Expert System (CAMES). We believe that CAMES is going to be a significant tool in the development of effective detectionbased information security systems. The next two sections provide the background material for our research. Particularly, in section 2, an overview of knowledge-based expert systems is given in detail, as we describe their characteristics, as well as the operation of expert systems. In section 3, we give an overview of access control techniques and we describe two major modern methodologies of access control policies: RBAC and TMAC. In section 4, the design and development of our approach is explained, starting with the description of the model we are based on (section 4.1.) and following with the implementation of our prototype Control Access Management Expert System, CAMES (section 4.2.). In section 5, general conclusions are presented. 2. Expert Systems - An Overview Expert Systems (ESs) is a branch of AI that makes extensive use of specialized knowledge to solve problems at the level of a human expert. The knowledge in ESs may be either expertise, or knowledge which is generally available from books, magazines, and knowledgeable persons. The terms expert system or knowledge-based system are often used synonymously. Most people use expert system simply because it s shorter, even though there may be no expertise in their expert system, only general knowledge [Giarratano & Riley, page 2, 1989]. An ES is a computer program that uses expertise to assist people in performing a wide variety of functions, including diagnosis, planning, scheduling and design. It deals with everything from the diagnosis of human diseases to the diagnosis of a malfunction on a space shuttle. Its programmers

3 use the expertise of one or several human specialists to create a tool that can be used by a layperson to solve difficult or ambiguous problems. An ES can be distinguished from a more conventional application program in that: It allows the change of the existing knowledge ( DYNAMIC BEHAVIOR ). Because sometimes the knowledge for some sector of science is non-stable, but it changes continuously, it must exist the suitable mechanisms for modification of existing knowledge, addition of new one or abstraction of incorrect knowledge from the system. It operates as an interactive system that responds to questions, asks for clarifications, makes recommendations and generally aids the decision-making process. To a user, this interactive interface is what would distinguish an ES from any ordinary computer tool. It solves problems by heuristic or approximate methods which, unlike algorithmic solutions, are not guaranteed to succeed. A heuristic is essentially a rule of thumb, which encodes a piece of knowledge about how to solve problems in some domain. Such methods are approximate in the sense that they do not require perfect data and the solutions derived by the system may be proposed with varying degrees of certainty. [Jackson, page 4] It is capable of explaining and justifying solutions or recommendations to convince the user that its reasoning is in fact correct. Research programs are typically run only by their creators, or by other personnel in similar laboratories. An ES will be run by a wider range of users, and should therefore be designed in such a way that its workings are rather more transparent. [Jackson, page 5] A chief advantage of ESs is their low cost compared with the expense of paying an expert or team of specialists. A user-friendly interface to the system allows the user to specify symptoms and to clarify the problem in response to questions asked by the system. The goal is to lead the user to discover a solution to the problem. The two main components of an ES are: the knowledge base, which differs from a database in that it contains executable program code (instructions) and the inference engine, which interprets and evaluates the instructions and data in the knowledge base.

4 Figure 2.1. [Giarratano & Riley, page 3, 1989] illustrates the basic concept of a knowledge-based expert system. Facts Facts Expertise Of course there are limitations of ESs, such as: and User lack of robustness and flexibility, inability to provide deep explanations, difficulties in verification. Expert System In spite of these limitations, ESs have proved their value in a number of important applications. In our case, characteristics like the "dynamic behavior" and the fact that they are designed for user interaction, as well as the other characteristics described above, have lead us to approach an access control application with expert system technology. Knowledge-Base Inference Engine 3. Access Control Access control in information systems ensures that accesses to the system objects occur according to the modes and rules fixed by the corresponding security policies [Sandhu, 1998]. A security policy is expressed by access rules, which determine how accesses are controlled and access decisions determined [Sandhu, 1997; Castano, 1995]. Access mechanisms can prescribe not only who may have access to a specific resource, but also the type of access that is permitted. In general, there are no security policies that are better than others. This is because, not all systems have the same protection requirements. Policies suitable for a given system may not be suitable for another. The choice of security policy depends on the particular characteristics of the environment to be protected [Sandhu, 1997]. Two major methodologies of security policies that are commonly used in computer systems, are: the role-based policies and the team-based policies Role-Based Access Control (RBAC) With role-based access controls, access rights are grouped by role name. This approach offers significant advantages because of scalability. Each user is assigned one or more roles, and each role is assigned one or more permissions that can be given to users in that role [NIST, 1999]. Users are granted membership into roles based on their competencies, credentials and responsibilities in the organization. User membership in roles can be revoked easily and new memberships established as needed. This simplifies the administration and management of permissions since roles can be updated without updating the permissions for every user on an

5 individual basis [NIST, 1995]. Moreover, the use of role hierarchies provides additional advantages since one role may implicitly include the operations that are associated with another role Team-Based Access Control (TMAC) The TMAC model was originally proposed by Thomas [Thomas, 1997]. TMAC recognized the importance of context information associated with collaborative tasks and the ability to apply this context to decisions regarding permission activation. The collaboration context of a team contains two pieces: the user context, which could be the current members (users) of a team, and the object context, which could be the set of object instances required by the team to accomplish its task. TMAC allows us to create a general structure (class/definition) of a team with role-based permission assignments to object-types. However, when a team is instantiated, the user context can be used to tailor the role-based permissions defined on object types to user-specific permissions on individual object instances considered to be part of a team's resources. By aligning access control to the symbol of teams, TMAC can provide a concept for access control that is natural and non-intrusive to the way users work in collaborative environments. 4. Control Access Management with Expert System An important aspect of access control mechanisms in the area of research has to do with their active or passive nature. The majority of well-known security models are characterized as passive ones in the sense that they include subject-object models for access control, which are implemented using access control matrices. These models do not distinguish between permission assignment and activation. Passive security permission assignment cannot support efficiently the dynamic aspect of many modern information systems. In dynamically changing environments there is a need for active security to control permission activation according to the current needto-know user requirements. One of the primary motivations of our work is the need to provide dynamic access control for certain types of enterprise data. The need for an enterprise user to access a particular piece of enterprise data may change over time due to changes in duties, changes in assignments, or for other reasons. A valid reason for access today may not be valid tomorrow. Dynamic access control automatically reacts to these changes, allowing access control decisions to take into consideration factors other than the usual subject, object, and permissions typical of standard access control models. Dynamic access control adds new dimensions to access decisions, considering not just who and what, but why and when.

6 It is important to note that dynamic access control does not replace other access control models and mechanisms. It instead allows these methods to be used more effectively. In our work, we use a dynamic approach for access control, called C-TMAC [Georgiadis, 2001] and we try to extend its dynamic behavior, using expert system technology Overview of Context-based Team Access Control (C-TMAC) The C-TMAC approach is based on the integration of RBAC [Sandhu, 1998] and the TMAC [Thomas, 1997] approaches. C-TMAC extends the original TMAC proposal [Thomas, 1997] in two key directions. First, it gives a framework to integrate TMAC concepts with RBAC. Second, it extends TMAC to use other contextual information, which can among others things include the time of access, the location from which access is requested, the location where the object to be accessed resides, transaction-specific values that dictate special access policies, etc. So, TMAC is allowed to model a richer set of access policies, which are more closely tied to application needs. C-TMAC consists of five sets of entities called Users, Roles, Permissions, Teams and Contexts, as well as a collection of Sessions, which are shown in the diagram of Figure 4.1. Figure 4.1. The C-TMAC approach Entity User (U) Role (R) Description Is a person Is a job responsibility within the organization with some associated semantics concerning the authority awarded on a member of the role

7 Permissions (P) Team (T) Context (C) Authorizations of a particular mode of access to one or more resources Is used to represent a group of users having specific roles with the objective of completing a specific activity in a particular context Here, is included information regarding the required data objects for a specific activity, as well as contextual information such as locations and time intervals etc The team concept is used also as a mechanism that associates users with contexts. The use of a team as an intermediary to enable a user to obtain a context is similar to the use of roles as an intermediary between users and permissions. Even when a user is acting alone, we may consider the user as the only member of a private team. An important property of a Session (S) is that the user associated with a session, cannot change. The association remains constant for the life of a session. The permissions available to the user are the union of permissions from all roles activated in that session. In addition, active roles in a session can be changed at the user s discretion. During a session, a user can participate in a number of teams. So, each session is also a mapping of one user to a subset of teams that he is a member of. The contexts available to the user are the union of contexts from all teams that he participates in. Moreover, active teams in a session can be changed at the user s discretion, just like his active roles. A team can also be seen as a mapping to multiple users. The roles activated by these users identify the permission set available to the team as the combination of permissions from all roles participating in that team. Users-Roles assignment (URS), Permissions-Roles assignment (PRS), Users-Teams assignment (UTS) and Contexts-Teams assignment (CTS) are many-to-many relations. A role can be assigned to many users and a user can be a member of many roles. Similarly, a role may have many permissions and the same permission can be assigned to many roles. These relations are the fundamental concepts in RBAC [Sandhu, 1998]. Also, a user can be a member of many teams and a team may have many users. Similarly, a team may have many contexts and the same context can be assigned to many teams. Still, there are constraints when assigning user to teams. An obvious constraint is related to the roles already assigned to the user. There are mutually exclusive roles and teams, e.g. a user that has been assigned the roles Physician and Director cannot participate in a care-team as a Director Overview of Control Access Management Expert System (CAMES) In this section, we describe the design and implementation of our prototype Control Access Management Expert System (CAMES). CAMES uses expert systems tools and particularly FLEX to implement the C-TMAC model. FLEX is an expressive and powerful expert system

8 toolkit which supports frame-based reasoning with inheritance, rule-based programming and data-driven procedures fully integrated within a logic programming environment, and contains its own English-like Knowledge Specification Language (KSL). FLEX has its own expressive English-like KSL for defining rules, frames and procedures. The KSL enables developers to write simple and concise statements about the expert's world and produce virtually self-documenting knowledge-bases which can be understood and maintained by non-programmers. In our application, we implement Users, Roles and Teams (see figure 4.1.) as frame hierarchies. Frame hierarchies in FLEX, are similar to object-oriented hierarchies. They allow data to be stored in an abstract manner within a nested hierarchy with common properties automatically inherited through the hierarchy. This avoids the unnecessary duplication of information, simplifies code and provides a more readable and maintainable system. Each frame or instance has a set of slots that contain attributes describing the frame's characteristics. These slots are analogous to fields within records (using database terminology) except that their expressive power is greatly extended. Suggestively we represent a piece of our code. Frame role. Frame medical is a role. Frame ward is a role. Frame admin is a role. Frame head_doctor is a medical. Frame head_nurse is a ward. Frame admin_staff is an admin. Frame user; Default possible_roles is nothing. Instance kwstas is a user; possible_roles are {head_doctor, paramedical_staff}. Frame team; Default available_roles are nothing. Frame care_team1; Default available_roles are { head_doctor, special_doctor } and Default location_contexts are { glab2, office7, office8 } and Default time_contexts are { (07:00-09:00), (11:00-12:00) }. During the login phase, a user has to complete the identification and authentication procedure, presenting suitable credentials (such as user-id and password information for local networks, or present digital certificates for internet/intranet environments). Then, the user has to select a role from the set of roles assigned to him. According to this selection, a particular set of role-based

9 permissions is granted and these are called session-roles permissions. This Users-Roles Assignment, URS (see figure 4.1.), is implemented in CAMES as a classical if-then rule. rule users_roles_assignment if the answer to username is User and the answer to ask_role is Role and User is an instance of user whose possible_roles include Role then remember that User is assigned as Role and display_assign(user, Role) Example: kwstas is assigned as head_doctor. The question ask_role is defined as follow: question ask_role Choose o role..; choose one of a role because I need to know your role. Similarly is defined the question username. FLEX has a built-in question and answer sub-system that allows final applications to query the user for additional input via interactive dialogs and also, a built-in explanation system which supports both how and why explanations. Explanations can be attached to both rules and questions using simple because clauses. After the role selection, the user has to select a subset of teams to participate. Indicatively, we introduce below a part of the implementation code that FLEX toolkit requires, in order to represent the concepts of Teams and Contexts: rule user_teams_assignment if the answer to select_team is Team and User is assigned as Role and Team s available_roles include Role and Team s location_contexts include currentuserlocation and Team s time_contexts include currentusertime then remember tha User is member of Team. Where currentuserlocation and currentusertime are variables that take values, depending on the place and the time that user tries to enter the team. After the team selection procedure is completed, the permission set of the user is combined with the permission set available to the team. As we have mentioned in section 4.1., teams can be seen as groups of current task contexts. This means that when a user participates in a team he gains also the context of his task. The team context is expressed in terms of ranges of values. For every team, there are a variety of system variables that can hold sets of values for chosen contextual information (factors). The binding of these variables to actual values is accomplished during the runtime by the administration subsystem of the organization.

10 5. Conclusion We have presented an approach to integrate access control concepts with expert system technology. The CAMES model introduced in this paper allows the use of general contextual information in access control expert systems and gives C-TMAC the capability to take advantage of the security-critical knowledge of the underlying expert system, as this knowledge changes during runtime. We have also shown in this paper, how CAMES concepts can be implemented over passive and active role-based security policies and mechanisms. We believe that CAMES will prove to be an interesting starting point for further investigations of security models for next generation collaborative applications. 6. References: [1] Castano S., Fugini M., Martella G. & Samarati P. (1995). Database Security, ACM Press, Addison Wesley, Padstow [2] Georgiadis Ch., Mavridis I., Pangalos G. & Thomas R. K. (May 2001). Flexible Teambased Access Control Using Contexts, SACMAT 01, Chantilly, VA [3] Giarratano J. & Riley G. (1989). Expert Systems: Principles and Programming, PWS- KENT Publishing Company, Boston [4] Jackson P.. Introduction to Expert Systems, 2nd ed. [5] NIST (1995). An Introduction to Role-based Access Control, NIST CSL Bulletin on RBAC, National Institute of Standards and Technology (Available in URL: [6] NIST (1999). Role Based Access Control, National Institute of Standards and Technology (Available in URL: [7] Sandhu R. & Samarati P. (1997). Authentication, Access Control and Intrusion Detection, The Computer Science and Engineering Handbook [8] Sandhu R. (1998). Role-Based Access Control, Advances in Computer, Vol.46, Academic Press [9] Thomas R. K. (1997). Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Enviroments, Proceedings of the second ACM workshop on Role-based access control, Fairfax, VA USA [10] Vlahavas I, Kefalas P, Vasiliadis N, Refanidis I, Kokkoras F, Sakellariou I. (Thessaloniki 2002). Artificial Intelligence

An Application of Integrating Role and Lattice Based Access Control in Database Engineering

An Application of Integrating Role and Lattice Based Access Control in Database Engineering An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics

More information

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach

A Model for Context-dependent Access Control for Web-based Services with Role-based Approach A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Application Design: Issues in Expert System Architecture. Harry C. Reinstein Janice S. Aikins

Application Design: Issues in Expert System Architecture. Harry C. Reinstein Janice S. Aikins Application Design: Issues in Expert System Architecture Harry C. Reinstein Janice S. Aikins IBM Scientific Center 15 30 Page Mill Road P. 0. Box 10500 Palo Alto, Ca. 94 304 USA ABSTRACT We describe an

More information

IAI : Expert Systems

IAI : Expert Systems IAI : Expert Systems John A. Bullinaria, 2005 1. What is an Expert System? 2. The Architecture of Expert Systems 3. Knowledge Acquisition 4. Representing the Knowledge 5. The Inference Engine 6. The Rete-Algorithm

More information

RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY

RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY RULE BASED EXPERT SYSTEM FOR SELECTING SOFTWARE DEVELOPMENT METHODOLOGY M. AYMAN AL AHMAR Asstt. Prof. and Deputy Dean, College of Engineering and Information Technology, Fujairah Campus, Ajman University

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

Role-Based Access Control Requirements Model with Purpose Extension

Role-Based Access Control Requirements Model with Purpose Extension Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information

More information

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform PRODUCT DATASHEET Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform IT MANAGEMENT BENEFITS Get successful on time and budget Start with a tactical solution, build for tomorrow

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]

More information

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment,

Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, Uncertainty Problems often have a certain amount of uncertainty, possibly due to: Incompleteness of information about the environment, E.g., loss of sensory information such as vision Incorrectness in

More information

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting

Using Use Cases for requirements capture. Pete McBreen. 1998 McBreen.Consulting Using Use Cases for requirements capture Pete McBreen 1998 McBreen.Consulting [email protected] All rights reserved. You have permission to copy and distribute the document as long as you make no changes

More information

Semantic Errors in SQL Queries: A Quite Complete List

Semantic Errors in SQL Queries: A Quite Complete List Semantic Errors in SQL Queries: A Quite Complete List Christian Goldberg, Stefan Brass Martin-Luther-Universität Halle-Wittenberg {goldberg,brass}@informatik.uni-halle.de Abstract We investigate classes

More information

ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM

ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.

More information

Expert Systems : AI Course Lecture 35 36, notes, slides www.myreaders.info/, RC Chakraborty, e-mail rcchak@gmail.

Expert Systems : AI Course Lecture 35 36, notes, slides www.myreaders.info/, RC Chakraborty, e-mail rcchak@gmail. Expert Systems : AI Course Lecture 35 36, notes, slides www.myreaders.info/, RC Chakraborty, e-mail [email protected], June 01, 2010 www.myreaders.info/html/artificial_intelligence.html www.myreaders.info

More information

White paper. Corrective action: The closed-loop system

White paper. Corrective action: The closed-loop system White paper Corrective action: The closed-loop system Contents Summary How corrective action works The steps 1 - Identify non-conformities - Opening a corrective action 6 - Responding to a corrective action

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Welcome to Information Systems Security (503009)

Welcome to Information Systems Security (503009) Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Course Outline Week Lectures 1 Information systems security: basic

More information

Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine

Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine 99 Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Faculty of Computers and Information Menufiya University-Shabin

More information

How Can Data Sources Specify Their Security Needs to a Data Warehouse?

How Can Data Sources Specify Their Security Needs to a Data Warehouse? How Can Data Sources Specify Their Security Needs to a Data Warehouse? Arnon Rosenthal The MITRE Corporation [email protected] Edward Sciore Boston College (and MITRE) [email protected] Abstract In current warehouse

More information

Incorporating database systems into a secure software development methodology

Incorporating database systems into a secure software development methodology Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic

More information

Role-based access control. RBAC: Motivations

Role-based access control. RBAC: Motivations Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

CpSc810 Goddard Notes Chapter 7. Expert Systems

CpSc810 Goddard Notes Chapter 7. Expert Systems CpSc810 Goddard Notes Chapter 7 Expert Systems Expert systems are designed to provide expert quality performance on domainspecific problems. In this chapter we look at the structure of expert systems focusing

More information

A logical approach to dynamic role-based access control

A logical approach to dynamic role-based access control A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture

Knowledge-based Approach in Information Systems Life Cycle and Information Systems Architecture 5 th Slovakian-Hungarian Joint Symposium on Applied Machine Intelligence and Informatics January 25-26, 2007 Poprad, Slovakia Knowledge-based Approach in Information Systems Life Cycle and Information

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

2 AIMS: an Agent-based Intelligent Tool for Informational Support

2 AIMS: an Agent-based Intelligent Tool for Informational Support Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY

CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.

More information

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP

Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o

More information

Select the right configuration management database to establish a platform for effective service management.

Select the right configuration management database to establish a platform for effective service management. Service management solutions Buyer s guide: purchasing criteria Select the right configuration management database to establish a platform for effective service management. All business activities rely

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

THE DEVELOPMENT OF AN EXPERT CAR FAILURE DIAGNOSIS SYSTEM WITH BAYESIAN APPROACH

THE DEVELOPMENT OF AN EXPERT CAR FAILURE DIAGNOSIS SYSTEM WITH BAYESIAN APPROACH Journal of Computer Science 9 (10): 1383-1388, 2013 ISSN: 1549-3636 2013 doi:10.3844/jcssp.2013.1383.1388 Published Online 9 (10) 2013 (http://www.thescipub.com/jcs.toc) THE DEVELOPMENT OF AN EXPERT CAR

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector

ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector ACCESS RIGHTS MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments

More information

A MODEL OF OPENEHR BASED ELECTRONIC MEDICAL RECORD IN INDONESIA

A MODEL OF OPENEHR BASED ELECTRONIC MEDICAL RECORD IN INDONESIA A MODEL OF OPENEHR BASED ELECTRONIC MEDICAL RECORD IN INDONESIA 1 A.B. Mutiara, 2 A. Muslim, 3 T. Oswari, 4 R.A. Miharja 1,2,4 Faculty of Computer Science and Information Technology, Gunadarma University,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

From Information to Answers: Transferring Expertise

From Information to Answers: Transferring Expertise From Information to Answers: Transferring Expertise How the SBA Uses EXSYS Online Knowledge Automation Expert Systems to Provide the Public with Automated Answers to Complex Regulatory Compliance Issues

More information

CHAPTER 22 Database Security Integration Using Role-Based Access Control

CHAPTER 22 Database Security Integration Using Role-Based Access Control CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]

More information

Knowledge Base and Inference Motor for an Automated Management System for developing Expert Systems and Fuzzy Classifiers

Knowledge Base and Inference Motor for an Automated Management System for developing Expert Systems and Fuzzy Classifiers Knowledge Base and Inference Motor for an Automated Management System for developing Expert Systems and Fuzzy Classifiers JESÚS SÁNCHEZ, FRANCKLIN RIVAS, JOSE AGUILAR Postgrado en Ingeniería de Control

More information

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4

IF The customer should receive priority service THEN Call within 4 hours PCAI 16.4 Back to Basics Backward Chaining: Expert System Fundamentals By Dustin Huntington Introduction Backward chaining is an incredibly powerful yet widely misunderstood concept, yet it is key to building many

More information

Using Abuse Case Models for Security Requirements Analysis

Using Abuse Case Models for Security Requirements Analysis Using Abuse Case Models for Security Requirements Analysis John McDermott and Chris Fox Department of Computer Science James Madison University Harrisonburg, Virginia 222807 E-mail: {mcdermot, fox}@cs.jmu.edu

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Auditing EMR System Usage. You Chen Jan, 17, 2013 [email protected]

Auditing EMR System Usage. You Chen Jan, 17, 2013 You.chen@vanderbilt.edu Auditing EMR System Usage You Chen Jan, 17, 2013 [email protected] Health data being accessed by hackers, lost with laptop computers, or simply read by curious employees Anomalous Usage You Chen,

More information

Goal-Driven Design of a Data Warehouse-Based Business Process Analysis System

Goal-Driven Design of a Data Warehouse-Based Business Process Analysis System Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases, Corfu Island, Greece, February 16-19, 2007 243 Goal-Driven Design of a Data Warehouse-Based Business

More information

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming

More information

Semantic Analysis of Business Process Executions

Semantic Analysis of Business Process Executions Semantic Analysis of Business Process Executions Fabio Casati, Ming-Chien Shan Software Technology Laboratory HP Laboratories Palo Alto HPL-2001-328 December 17 th, 2001* E-mail: [casati, shan] @hpl.hp.com

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Writing Reports BJECTIVES ONTENTS. By the end of this section you should be able to :

Writing Reports BJECTIVES ONTENTS. By the end of this section you should be able to : Writing Reports By the end of this section you should be able to : O BJECTIVES Understand the purposes of a report Plan a report Understand the structure of a report Collect information for your report

More information

Improving Knowledge-Based System Performance by Reordering Rule Sequences

Improving Knowledge-Based System Performance by Reordering Rule Sequences Improving Knowledge-Based System Performance by Reordering Rule Sequences Neli P. Zlatareva Department of Computer Science Central Connecticut State University 1615 Stanley Street New Britain, CT 06050

More information

Secure Database Development

Secure Database Development Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,

More information

A Prototype Student Advising Expert System Supported with an Object-Oriented Database

A Prototype Student Advising Expert System Supported with an Object-Oriented Database A Prototype Student Advising Expert System Supported with an Object-Oriented Database M. Ayman Al Ahmar Deputy Dean, College of Information Technology Ajman University of Science and Technology (AUST)

More information

The Phios Whole Product Solution Methodology

The Phios Whole Product Solution Methodology Phios Corporation White Paper The Phios Whole Product Solution Methodology Norm Kashdan Phios Chief Technology Officer 2010 Phios Corporation Page 1 1 Introduction The senior staff at Phios has several

More information

SIMATIC PCS 7 takes you beyond the limits. SIMATIC PCS 7. Answers for industry.

SIMATIC PCS 7 takes you beyond the limits. SIMATIC PCS 7. Answers for industry. SIMATIC PCS 7 takes you beyond the limits. SIMATIC PCS 7 Answers for industry. Your benefits Performance Scalability Integration Safety & Security Innovation Modernization Global Network of Experts 2 The

More information

4. Understanding Clinical Data and Workflow Understanding Surveillance Data Exchange Processes Guide and Worksheet

4. Understanding Clinical Data and Workflow Understanding Surveillance Data Exchange Processes Guide and Worksheet To properly prepare for implementing the pilot of your surveillance program and its subsequent rollout, you must understand the surveillance data exchange processes. These processes can vary depending

More information

Guide to CQI Qualifications for learners

Guide to CQI Qualifications for learners Guide to CQI Qualifications for learners CQI Qualifications and Professional Recognition Quality management is about improving organisational performance in delivering product and service that meet customer

More information

Role Based Access Control (RBAC) Nicola Zannone

Role Based Access Control (RBAC) Nicola Zannone Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access

More information

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD) USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To

More information

Design and Development of Electronic Prescription and Patient Information Systems for Developing World By

Design and Development of Electronic Prescription and Patient Information Systems for Developing World By Design and Development of Electronic Prescription and Patient Information Systems for Developing World By Dr Boniface Ekechukwu* and Chidi Obi **Dr Arinze Nweze* *Department of Computer Science, Nnamdi

More information

Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach

Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)

More information

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and

More information

April 2010. promoting efficient & effective local government

April 2010. promoting efficient & effective local government Department of Public Works and Environmental Services Department of Information Technology Fairfax Inspections Database Online (FIDO) Application Audit Final Report April 2010 promoting efficient & effective

More information

Full Compliance Contents

Full Compliance Contents Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Chapter 23. Database Security. Security Issues. Database Security

Chapter 23. Database Security. Security Issues. Database Security Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database

More information

ADO and SQL Server Security

ADO and SQL Server Security ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services

More information

Software Requirements Specification. Human Resource Management System. Sponsored by Siemens Enterprise Communication. Prepared by InnovaSoft

Software Requirements Specification. Human Resource Management System. Sponsored by Siemens Enterprise Communication. Prepared by InnovaSoft Software Requirements Specification Human Resource Management System Sponsored by Siemens Enterprise Communication Prepared by InnovaSoft Cansu Hekim - 1630888 Bekir Doğru - 1560085 Zaman Safari - 1572254

More information

An Agent-Based Concept for Problem Management Systems to Enhance Reliability

An Agent-Based Concept for Problem Management Systems to Enhance Reliability An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub

More information

Secure Web. Authentication and Access Control

Secure Web. Authentication and Access Control Secure Web Authentication and Access Control Table of Contents 1. Introduction... 1 1.1. About Secure Web... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Introduction... 2 3. Authentication

More information

Introduction to Web Services

Introduction to Web Services Department of Computer Science Imperial College London CERN School of Computing (icsc), 2005 Geneva, Switzerland 1 Fundamental Concepts Architectures & escience example 2 Distributed Computing Technologies

More information

A MODEL OF OPENEHR-BASED ELECTRONIC MEDICAL RECORD IN INDONESIA

A MODEL OF OPENEHR-BASED ELECTRONIC MEDICAL RECORD IN INDONESIA A MODEL OF OPENEHR-BASED ELECTRONIC MEDICAL RECORD IN INDONESIA 1 A.B. MUTIARA, 2 A. MUSLIM, 3 T. OSWARI, 4 R. ASRITA 1 Prof., Faculty of Computer Science and Information Technology, Gunadarma University,

More information

WHITE PAPER. Understanding Transporter Concepts

WHITE PAPER. Understanding Transporter Concepts WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional

More information

Writing Business documents and. All material will be adapted from Botha, D. et al. 2007. Public Relations: Fresh Perspectives. Pearson Education SA

Writing Business documents and. All material will be adapted from Botha, D. et al. 2007. Public Relations: Fresh Perspectives. Pearson Education SA Writing Business documents and Formal Texts All material will be adapted from Botha, D. et al. 2007. Public Relations: Fresh Perspectives. Pearson Education SA Introduction Writing business documents in

More information

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination

More information

Healthcare Measurement Analysis Using Data mining Techniques

Healthcare Measurement Analysis Using Data mining Techniques www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 03 Issue 07 July, 2014 Page No. 7058-7064 Healthcare Measurement Analysis Using Data mining Techniques 1 Dr.A.Shaik

More information

OpenHRE Security Architecture. (DRAFT v0.5)

OpenHRE Security Architecture. (DRAFT v0.5) OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2

More information

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: [email protected];

More information

Dementia. Post Diagnostic Support. HEAT Target

Dementia. Post Diagnostic Support. HEAT Target Q ue S T Q uality and E fficiency S upport Team Dementia Post Diagnostic Support HEAT Target Information Flow Mapping Guide February 2013 DRAFT ID: A5110749 Version: 5 Page 1 of 11 Contents 1.0 Background...

More information