An Ontology-based Approach to the Formalization of Information - - PowerPoint PPT Presentation

an ontology based approach to the formalization of
SMART_READER_LITE
LIVE PREVIEW

An Ontology-based Approach to the Formalization of Information - - PowerPoint PPT Presentation

An Ontology-based Approach to the Formalization of Information Security Policies An Ontology-based Approach to the Formalization of Information Security Policies Fernando Nufel do Amaral Carlos Bazlio Geiza Maria Hamazaki da Silva


slide-1
SLIDE 1

An Ontology-based Approach to the Formalization of Information Security Policies

An Ontology-based Approach to the Formalization of Information Security Policies

Fernando Náufel do Amaral Carlos Bazílio Geiza Maria Hamazaki da Silva Alexandre Rademaker Edward Hermann Haeusler

TecMF

  • Dept. of Informatics

PUC-Rio, Brazil

VORTE 2006

slide-2
SLIDE 2

An Ontology-based Approach to the Formalization of Information Security Policies Motivation

Project Anubis

Participants

◮ IS Consulting Firm ⇒ Experienced at developing and

implementing tools and techniques for Information Security and Risk Analysis. Strong presence in the marketplace.

◮ TecMF ⇒ Experienced at developing and using logic- and

formal-semantic-based techniques, languages and

  • frameworks. Intensional programming (TXL, XSLT,

MAUDE, etc).

slide-3
SLIDE 3

An Ontology-based Approach to the Formalization of Information Security Policies Motivation

Project Anubis

Demands

◮ IS Consulting Firm ⇒ Rethink / refactor / adapt

a proprietary tool for Risk Analysis and Information Security

◮ TeCMF ⇒ Develop case studies and solutions

for real-world, industrial-scale problems

slide-4
SLIDE 4

An Ontology-based Approach to the Formalization of Information Security Policies Motivation Working Environment

Working Environment

Main Concepts in Information Security

◮ Standards, Control Objectives ◮ Security Policies, Actions, Security Controls ◮ The big picture

slide-5
SLIDE 5

An Ontology-based Approach to the Formalization of Information Security Policies Motivation Working Environment

Standards

◮ Public documents in normative text ◮ Set of Control Objectives to be accomplished by the

  • rganization desiring a higher level of security

◮ State what should be achieved at a higher level of

abstraction

◮ Control-based × threat-based approach to security

slide-6
SLIDE 6

An Ontology-based Approach to the Formalization of Information Security Policies Motivation Working Environment

Security Policies

◮ The organization’s Security Policy is implemented through

a set of Actions

◮ Actions should achieve the Control Objectives and protect

the organization against potential threats

◮ Actions are implemented by a set of Security Controls ◮ Security Controls are low-level technical measures that

can be directly observed / implemented

slide-7
SLIDE 7

An Ontology-based Approach to the Formalization of Information Security Policies Motivation Working Environment

The Security Landscape Nowadays

Threat and Risk Analysis Control Objective Control Objective

Action Action

Security Policy Directly applicable assertives Security Control Security Control

+

Standards (Cobit, Iso/Nist, Coso)

slide-8
SLIDE 8

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

Computer-Aided Risk Analysis Tools

◮ Implemented from an initial

set of empirically defined security controls

◮ Updated on demand ◮ Human-performed

conformance analysis

◮ Designed in bottom-up

fashion

◮ Represents the knowledge

  • f an expert group

◮ Need for conformance ◮ Computer stores data and

performs minimal inference

◮ Based on the needs of the

market

slide-9
SLIDE 9

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

Computer-Aided Risk Analysis Tools

◮ Implemented from an initial

set of empirically defined security controls

◮ Updated on demand ◮ Human-performed

conformance analysis

◮ Designed in bottom-up

fashion

◮ Represents the knowledge

  • f an expert group

◮ Need for conformance ◮ Computer stores data and

performs minimal inference

◮ Based on the needs of the

market

slide-10
SLIDE 10

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

Computer-Aided Risk Analysis Tools

◮ Implemented from an initial

set of empirically defined security controls

◮ Updated on demand ◮ Human-performed

conformance analysis

◮ Designed in bottom-up

fashion

◮ Represents the knowledge

  • f an expert group

◮ Need for conformance ◮ Computer stores data and

performs minimal inference

◮ Based on the needs of the

market

slide-11
SLIDE 11

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

Computer-Aided Risk Analysis Tools

◮ Implemented from an initial

set of empirically defined security controls

◮ Updated on demand ◮ Human-performed

conformance analysis

◮ Designed in bottom-up

fashion

◮ Represents the knowledge

  • f an expert group

◮ Need for conformance ◮ Computer stores data and

performs minimal inference

◮ Based on the needs of the

market

slide-12
SLIDE 12

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Role of Formal Analysis of Systems / Theories

Provide techniques, tools and methodologies to work with the Principle of Falseability of Theories towards the (formal) validation of software and specifications

slide-13
SLIDE 13

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

Known Techniques / Tools

◮ Ad-hoc and systematic testing ◮ Simulation (including stochastic modeling) ◮ Logical and algebraic languages: theorem proving and

model checking

slide-14
SLIDE 14

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-15
SLIDE 15

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-16
SLIDE 16

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-17
SLIDE 17

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-18
SLIDE 18

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-19
SLIDE 19

An Ontology-based Approach to the Formalization of Information Security Policies Motivation The Big Picture

An Ontology-based Approach to Security Policies

The Chosen Techniques / Tools

◮ Declarative knowledge + ◮ Conformance validation as an imperative feature ◮ = Logical approach with computer-aided validation cycle ◮ Description-logic-based ontology + set of tools for CAV ◮ Knowledge extraction from natural language texts

(standards)

◮ Context-independent representation of utterances

slide-20
SLIDE 20

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies

slide-21
SLIDE 21

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies

The Front-End

slide-22
SLIDE 22

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies

Looking into the ontology

◮ AdministerRemotely ⊑ AccessRemotely and

NetwareServer ⊑ System are assertions in the IS taxonomy

◮ “Configuring X to achieve Y” is equivalent to “Achieving Y”

is asserted in the Axioms section of the ontology: ∃hasVerb.(Configure ⊓ ∃hasTheme.X ⊓ ∃hasPurpose.Y) ≡ ∃hasVerb.Y

slide-23
SLIDE 23

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies

Looking into the ontology

◮ AdministerRemotely ⊑ AccessRemotely and

NetwareServer ⊑ System are assertions in the IS taxonomy

◮ “Configuring X to achieve Y” is equivalent to “Achieving Y”

is asserted in the Axioms section of the ontology: ∃hasVerb.(Configure ⊓ ∃hasTheme.X ⊓ ∃hasPurpose.Y) ≡ ∃hasVerb.Y

slide-24
SLIDE 24

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Controls ⊑ Actions

◮ Action0002 ◮ Control0001 ◮ Control0001 ⊑ Action0002

slide-25
SLIDE 25

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Action0002

Configure every system to encrypt connections used for remote access to the system. Action0002 ≡ ∃hasVerb.(Configure ⊓ ∃hasTheme.System ⊓ ∃hasPurpose.(Encrypt ⊓ ∃hasTheme.(NetworkConnect ⊓ ∃isInstrumentOf.(AccessRemotely ⊓ ∃hasTheme.System))))

slide-26
SLIDE 26

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Controls ⊑ Actions

◮ Action0002 ◮ Control0001 ◮ Control0001 ⊑ Action0002

slide-27
SLIDE 27

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001

Network traffic for the remote administration of the Netware server must be encrypted using SSL. Control0001 ≡ ∃hasVerb.(Encrypt ⊓ ∃hasTheme.NetworkTraffic ⊓ ∃hasInstrument.SSL ⊓ ∃isInstrumentOf. (AdministerRemotely ⊓ ∃hasTheme.NetwareServer))

slide-28
SLIDE 28

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Controls ⊑ Actions

◮ Action0002 ◮ Control0001 ◮ Control0001 ⊑ Action0002

slide-29
SLIDE 29

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-30
SLIDE 30

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-31
SLIDE 31

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-32
SLIDE 32

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-33
SLIDE 33

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-34
SLIDE 34

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-35
SLIDE 35

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Control0001 ⊑ Action0002

Since “Encrypt the NetworkConnection” is the same as “Encrypt the NetworkTraffic”, NetwareServer is a System, and AdministerRemotely implies AccessRemotely, then ◮ Control0001, requiring that one ◮ Encrypt the NetworkTraffic using SSL in order to

AdministerRemotely the NetwareServer, implies

◮ Encrypt the NetworkTraffic in order to AdministerRemotely

the NetwareServer, and hence,

◮ Encrypt the NetworkTraffic in order to AccessRemotely a

System, and hence,

◮ Encrypt the NetworkConnection in order to

AccessRemotely a System, which conforms to

◮ Action0002, according to this detailed proof...

slide-36
SLIDE 36

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Synonyms

∃hasVerb.(Encrypt ⊓ ∃hasTheme.NetworkConnect) ≡ ∃hasVerb.(Encrypt ⊓ ∃hasTheme.NetworkTraffic)

slide-37
SLIDE 37

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

Part of IS Taxonomy

NetwareServer ⊑ System AdministerRemotely ⊑ AccessRemotely

slide-38
SLIDE 38

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

I-Seq Ec ⇒ Ec weak-l Ec,(∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ Ec ISTax-Seq NetTr ⇒ NetCon prom NetTr

hT ⇒ NetCon hT

∃-r NetTr

hT ⇒ (∃hT.NetCon)

∃-l (∃hT.NetTr) ⇒ (∃hT.NetCon) weak-l (∃hT.NetTr),(∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃hT.NetCon) ISTax-Seq AdRem ⇒ AcRem weak-l AdRem,(∃hT.NetSvr) ⇒ AcRem ⊓-l AdRem ⊓ (∃hT.NetSvr) ⇒ AcRem ISTax-Seq NetSvr ⇒ Sys prom NetSvr

hT ⇒ sys hT

∃-l (∃hT.NetSvr) ⇒ sys

hT

weak AdRem,(∃hT.NetSvr) ⇒ Sys

hT

⊓-l AdRem ⊓ (∃hT.NetSvr) ⇒ Sys

ht

∃-r AdRem ⊓ (∃hT.NetSvr) ⇒ (∃hT.Sys) ⊓-r AdRem ⊓ (∃hT.NetSvr) ⇒ acRem ⊓ (∃hT.Sys) prom (AdRem ⊓ ∃hT.NetSvr)

iO ⇒ (acRem ⊓ ∃hT.Sys) iO

∃-r (AdRem ⊓ ∃hT.NetSvr)

iO ⇒ (∃iO.(acRem ⊓ ∃hT.Sys))

∃-l (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃iO.(acRem ⊓ ∃hT.Sys)) weak-l (∃hT.NetTr),(∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃iO.(acRem ⊓ ∃hT.Sys)) ⊓-r (∃hT.NetTr),(∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) weak-l (∃hI.SSL),(∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) ⊓-l (∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) weak-l Ec,(∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) ⊓-r Ec,(∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) ⊓-l Ec ⊓ (∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)) ⇒ Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)) prom (Ec ⊓ (∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)))

hV ⇒ (Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys))) hV

∃-l ∃hV.(Ec ⊓ (∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr))) ⇒ (Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys)))

hV

∃-r ∃hV.(Ec ⊓ (∃hI.SSL) ⊓ (∃hT.NetTr) ⊓ (∃iO.(AdRem ⊓ ∃hT.NetSvr)))) ⇒ ∃hV.(Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys))) Naming Control0001 ⇒ ∃hV.(Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys))) LF-Axiom ∃hV.(Ec ⊓ (∃hT.NetCon) ⊓ (∃iO.(acRem ⊓ ∃hT.Sys))) ⇒ Action0002 cut Control0001 ⇒ Action0002

slide-39
SLIDE 39

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies An Example

A (New) Sequent Calculus for ALC

α ⇒ α ∆1 ⇒ Γ1, L1αL2

L′

1αL′ 2, ∆2 ⇒ Γ2

L1 ≈ L′

1

L2 ≈ L′

2

∆1, ∆2 ⇒ Γ1, Γ2 cut ∆ ⇒ Γ ∆, α ⇒ Γ weak − l ∆ ⇒ Γ ∆ ⇒ Γ, α weak − r ∆1, α, β, ∆2 ⇒ Γ ∆1, β, α, ∆2 ⇒ Γ perm − l ∆ ⇒ Γ1, α, β, Γ2 ∆ ⇒ Γ1, β, α, Γ2 perm − r

slide-40
SLIDE 40

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-41
SLIDE 41

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-42
SLIDE 42

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-43
SLIDE 43

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-44
SLIDE 44

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-45
SLIDE 45

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture

slide-46
SLIDE 46

An Ontology-based Approach to the Formalization of Information Security Policies Main Goal: Computer-Aided Formulation and Validation of Security Policies Concluding Remarks

Results – Obtained and Expected

◮ An architecure for the construction, validation and

maintenance of knowledge bases in IS

  • 1. Assisted knowledge extraction from normative text
  • 2. Use of natural language in documenting the cycle
  • f formal analysis of the knowledge base
  • 3. Integrated environment supporting version control
  • f aspects of the knowledge base

◮ Use of Curry-Howard isomorphism to provide

explanation of proofs

◮ Model checking and user support under development ◮ Domain-independent version of the architecture