1 / 26

Data and Applications Security Developments and Directions

This paper discusses the use of conceptual structures and an inference engine to process security constraints in data and applications, along with an integrated architecture for query, update, and database design operations. It also explores real-world examples in the military and medical records domains, and highlights the relationship between the inference problem and the privacy problem.

haakenson
Download Presentation

Data and Applications Security Developments and Directions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Inference Problem - II September 19, 2014

  2. Outline • Security Constraint Processing • Use of Conceptual Structures

  3. Security Constraint Processing • Security Constraints are rules that assign security levels to the data • MLS/DBMS is augmented with an Inference Engine • Inference Engine is the Inference Controller • Integrated Architecture for Security Constraint processing • Query, Update and Database design operations

  4. Inference Engine Approach

  5. Constraint Generation

  6. Query Processor

  7. Update Processor

  8. Database Design Tool

  9. Integrated Architecture

  10. Release Control Management

  11. Use of Conceptual Structures • Use conceptual structures to model the application • E.g., semantic data models, semantic nets, conceptual graphs, etc. • Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur

  12. Multilevel Semantic Nets

  13. Complex Multilevel Semantic Net Italy Destination 20 years India Mediterranean Sea Skills Location REAGAN Smith Captain Date 16 June 2000 Skills Carries SUN Explosive Battle Passengers Management Type

  14. ISA/AKO Links

  15. AKO AKO AKO AKO WATER WATER SHIPS SHIP SHIP SHIPS VEHICLE VEHICLE WEAPONS WEAPONS VEHICLE VEHICLE (a) (a) AKO AKO AKO AKO Has Captain Has Captain WATER WATER SHIPS SHIP SHIP SHIPS VEHICLE VEHICLE WEAPONS WEAPONS PERSON PERSON (b) (b) Has Captain Has Captain ISA AKO REAGAN SHIPS SHIP WATER WEAPONS VEHICLE (c) ISA Example Rules - II

  16. ISA ISA Has Captain Has Captain SHIP SHIP SHIPS SHIPS REAGAN REAGAN WEAPONS WEAPONS PERSON PERSON (d) (d) Has Captain Has Captain Destination ISA India SHIPS REAGAN WEAPONS COUNTRY (e) Destination Example Rules - II

  17. Applying Transfer Rules India Destination Mediterranean Sea India Mediterranean Sea (b) Location REAGAN Location REAGAN Smith Carries (a) Carries Skills Type SUN Explosive Type Battle SUN Explosive Management Destination India Mediterranean Sea Location REAGAN Smith (c) Combines (a) and (b) Carries Skills Type Battle SUN Explosive Management

  18. Security Constraints Carries Carries SHIPS SHIPS REAGAN REAGAN WEAPONS SUN SUN WEAPONS (a) (a) Mediterranean Mediterranean Location Carries Carries SHIPS SHIPS REAGAN REAGAN SUN SUN (b) (b) Destination Destination COUNTRY COUNTRY

  19. COUNTRY Mediterranean Destination Sea Location REAGAN Smith Captain Skills Carries SUN Explosive (a) Battle Management Type COUNTRY ISA India Mediterranean Sea Destination Location REAGAN Smith Captain Skills Carries (b) SUN Explosive Battle Management Type Security Constraint Violation - I

  20. Security Constraint Violation - II

  21. Universal and Existential Conditionals

  22. Matching Vectors

  23. Matching and Binding India Destination Location Mediterranean SHIP: ALL X (a) Destination Carries New Delhi India Mediterranean Sea Explosive WEAPONS: SOME Y Destination Capital Capital Type Location REAGAN Smith Captain (b) FLORIDA FLORIDA New Delhi India Skills Mediterranean Sea Destination Carries Carries Capital Carries Battle Location SUN Explosive MOON MOON REAGAN Management Smith Type Type Captain Type FLORIDA Skills Carries (c ) Results from (a) and (b) (c ) Results from (a) and (b) Carries Battle SUN Explosive MOON Management Type Type

  24. Negative Statements

  25. Refutation LOCATION FLORIDA REAGAN SHIPS SHIPS WEAPONS REAGAN Pacific Ocean WEAPONS DESTINATION DESTINATION (a) (b) Australia Australia WEAPONS WEAPONS FLORIDA FLORIDA REAGAN REAGAN WEAPONS WEAPONS SHIPS SHIPS DESTINATION REAGAN SHIPS Australia WEAPONS LOCATION DESTINATION X X Pacific Ocean Pacific Ocean (c ) Australia Australia WEAPONS WEAPONS (d) FLORIDA SHIPS WEAPONS REAGAN LOCATION DESTINATION Australia Pacific Ocean WEAPONS WEAPONS (e)

  26. Directions • Inference problem is still being investigated • Census bureau still working on statistical databases • Need to find real world examples in the Military world • Inference problem with respect to medial records • Much of the focus is now on the Privacy problem • Privacy problem can be regarded to be a special case of the inference problem

More Related