Data Flow Security Analysis for System-of-Systems in a Public Security Incident

In any system-of-systems there is the potential for interactions between systems to occur that affect the security of the overall system. This paper presents a scenario that highlights such potential problems. This scenario considers cooperation and interactions between organisations and systems that might occur in the context of a major public security incident involving multiple emergency services such as police, fire and ambulance services. Based on this we present a modelling tool able to highlight potential access violations that might occur through the transfer of data between multiple organisations, and suggest ways that vulnerabilities highlighted by the tool can be mitigated. Using the example scenario, we suggest how security and operational effectiveness can be achieved by applying safeguards to those areas that are vulnerable, while allowing the free flow of data between organisations where this is shown to be safe.

[1]  Elisa Bertino,et al.  Context-Aware Adaptation of Access-Control Policies , 2008, IEEE Internet Computing.

[2]  Ning Zhang,et al.  An effective model for composition of secure systems , 1998, J. Syst. Softw..

[3]  Jie Xu,et al.  Securing instance-level interactions in Web services , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..

[4]  Heiko Mantel,et al.  Combining Different Proof Techniques for Verifying Information Flow Security , 2006, LOPSTR.

[5]  Xukai Zou,et al.  Composing Access Control Policies of Distributed Components , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.

[6]  Andreas Schaad,et al.  A model-checking approach to analysing organisational controls in a loan origination process , 2006, SACMAT '06.

[7]  Deren Chen,et al.  Securing role-based distributed collaboration system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[8]  Li Gong,et al.  The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Mario Kolberg,et al.  Feature interactions in services for Internet personal appliances , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[10]  R. Jalili,et al.  Modeling of network security-related behaviours using NVML , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..

[11]  Simone Tini,et al.  Rule formats for compositional non-interference properties , 2004, J. Log. Algebraic Methods Program..

[12]  Pierluigi Ritrovato,et al.  Dynamic security perimeters for inter-enterprise service integration , 2007, Future Gener. Comput. Syst..

[13]  Morris Sloman,et al.  Domain-based access control for distributed computing systems , 1988, Softw. Eng. J..

[14]  Rakesh Kumar,et al.  Composition trust bindings in pervasive computing service composition , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[15]  John McLean Trustworthy Software: Why we need it, Why we don't have it, How we can get it , 2006, COMPSAC.

[16]  Andrea Omicini,et al.  An algebraic approach for modelling organisation, roles and contexts in MAS , 2005, Applicable Algebra in Engineering, Communication and Computing.

[17]  Deborah Estrin Inter-organization networks: implications of access control: requirements for interconnection protocol , 1986, SIGCOMM '86.

[18]  Philip Robinson,et al.  Dynamic virtual organization management for service oriented enterprise applications , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[19]  Christoph Ruland,et al.  Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations , 2005, TrustBus.

[20]  Joon S. Park,et al.  Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.

[21]  Brendan Jennings,et al.  Context driven, user-centric access control for smart spaces , 2005 .

[22]  Jan Jürjens Composability of Secrecy , 2001, MMM-ACNS.

[23]  Riccardo Focardi,et al.  Information flow security in dynamic contexts , 2006, J. Comput. Secur..

[24]  T. C. Ting,et al.  Information sharing and security in dynamic coalitions , 2002, SACMAT '02.