Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control

This paper presents a new model for, or rather a new way of thinking about adaptive, risk-based access control. Our basic premise is that there is always inherent uncertainty and risk in access control decisions that is best addressed in an explicit way. We illustrate this concept by showing how the rationale of the well-known, Bell-Lapadula model based, multi-level security (MLS) access control model could be used to develop a risk-adaptive access control model. This new model is more like a fuzzy logic control system than a traditional access control system and hence the name "fuzzy MLS". The long version of this paper is published as an IBM Research Report.

[1]  Michael J. Nash,et al.  The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[2]  Anton Riabov,et al.  Planning for Stream Processing Systems , 2005, AAAI.

[3]  Paul A. Karger,et al.  Multi-level security requirements for hypervisors , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[4]  B. D. GOLD,et al.  A security retrofit of VM/370 , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[5]  Axel Schairer,et al.  Verification of a Formal Security Model for Multiapplicative Smart Cards , 2000, ESORICS.

[6]  E. Mizutani,et al.  Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review] , 1997, IEEE Transactions on Automatic Control.

[7]  S. Sunder Experimental Asset Markets: A Survey , 1992 .

[8]  Axel Schairer,et al.  Verified Formal Security Models for Multiapplicative Smart Cards , 2002, J. Comput. Secur..

[9]  Dorothy E. Denning,et al.  A lattice model of secure information flow , 1976, CACM.

[10]  Anton Riabov,et al.  Scalable Planning for Distributed Stream Processing Systems , 2006, ICAPS.

[11]  Chuen-Tsai Sun,et al.  Neuro-fuzzy And Soft Computing: A Computational Approach To Learning And Machine Intelligence [Books in Brief] , 1997, IEEE Transactions on Neural Networks.

[12]  Vernon L. Smith,et al.  Papers in Experimental Economics: Markets as Economizers of Information: Experimental Examination of the “Hayek Hypothesis” , 1991 .

[13]  Pau-Chen Cheng,et al.  BlueBoX: A policy-driven, host-based intrusion detection system , 2003, TSEC.

[14]  K. J. Bma Integrity considerations for secure computer systems , 1977 .

[15]  David Ingram,et al.  Risk Models for Trust-Based Access Control(TBAC) , 2005, iTrust.

[16]  Sue Ammen,et al.  Race and correctional officers' punitive attitudes toward treatment programs for inmates , 1996 .

[17]  Fan Ye,et al.  Multi-site cooperative data stream analysis , 2006, OPSR.

[18]  Mary Ellen Zurko,et al.  A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..

[19]  Etienne J. Khayat,et al.  Risk Based Security Analysis of Permissions in RBAC , 2004, WOSIS.

[20]  Claudio Bartolini,et al.  Market-Based Resource Allocation for Utility Data Centers , 2003 .

[21]  Bill Cheswick,et al.  Firewalls and internet security - repelling the wily hacker , 2003, Addison-Wesley professional computing series.

[22]  D. F. Stork Downgrading in a Secure Multilevel Computer System: The Formulary Concept , 1975 .

[23]  D. MacKenzie,et al.  The use of knowledge about society , 2008 .

[24]  Navendu Jain,et al.  Adaptive Control of Extreme-scale Stream Processing Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[25]  Roger R. Schell,et al.  Designing the GEMSOS security kernel for security and performance , 1985 .