1 / 9

Detecting Conflicts of Interest

Analyzing organizational requirements is crucial for building secure systems, as conflicts of interest often compromise security. This paper proposes classifications and solutions to mitigate conflicts of interest, highlighting the need for analysis of the organizational setting and references to legal theory. The Secure Tropos methodology and automated reasoning tools are used to model and analyze conflicts of interest during the requirements engineering process. Future work includes defining solutions for mitigating conflicts and automatically extracting separation of duty constraints.

ayalac
Download Presentation

Detecting Conflicts of Interest

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone Department of Information and Communication Technology University of Trento Detecting Conflicts of Interest

  2. Conflicts of Interest • Analyzing organizational requirements is fundamental to build secure systems • Security is often compromised by exploiting vulnerabilities in the socio-technical system • Conflicts of interest are critical in the development of secure systems since “trusted” actors often abuse their position to gain personal advantages • e.g., an employee working in Front Office and in Back Office • e.g., in the early nineties John Rusnak gained nearly $500.000 in bonuses for fake bank profits by exploiting his trader position at Allied Irish Bank

  3. Some Proposals • Proposed a number of classifications and solutions to mitigate conflicts • divergences between goals [van Lamsweerde et al.] • overlap of the subjects of authorization policies [Moffett et al.] • privilege-privilege conflicts and role-role conflicts in role-based access control [Nyanchama et al.] • Unfortunately, current solutions are unsatisfactory • No analysis of the organizational setting • Proposed taxonomies of conflicts are based on mechanisms for preventing them, instead of understanding why and when they occur • Solutions hardly make any reference to the legal theory on which they are based

  4. A conflict of interest is “a situation in which a person has a duty to more than one person or organization, but cannot do justice to the actual or potentially adverse interests of both parties. This includes when an individual's personal interests or concerns are inconsistent with the best for a customer, or when a public official's personal interests are contrary to his/her loyalty to public business.” http://dictionary.law.com A Law Definition

  5. Conflict (of Interest) Classification • Attorney-in-fact conflict • the interests of the delegatee interfere with the interests of the delegator • Role conflict • an agent is assigned a role whose interests collide with those of the agent • Self-monitoring conflict • an actor is responsible for monitoring his own behaviour

  6. Secure Tropos • Requirements Engineering methodology tailored to model both the organizational environment of a system and the system itself • Support modeling and analysis of functional and security requirements • Founded on the notions of ownership, provisioning, trust, and delegation • define entitlements, capabilities and responsibilities of stakeholders and system's actors and their transfer. • Automated Reasoning Support for Security Requirements Analysis

  7. Attorney-in-fact conflict Conflicts of Interest in Secure Tropos Role conflict Self-monitoring conflict

  8. Verification Process • Design the requirements model • identify stakeholders along with their objectives, entitlements and capabilities • identify social relations among stakeholders • identify conflicting interests • Computer Aided Requirements Engineering • Diagrams (automatically) mapped into a Formal Model • Check the properties on the Formal Model • ← delegateChain(exec,A,B,S1) ʌ neg_contribution(S1,S2) ʌ aims(B,S2)

  9. Conclusion • Identify conflicts of interest during the early phases of the software system development process. • Investigate the sources of conflicts of interest at requirements (as opposed to policy) level grounding our notions on legal theory • Define a clear-cut formalization that allows for automatic detection of conflicts • Future Work • Define solutions for mitigating conflicts of interest • Reconstructing the organizational structure • Automatically extracting separation of duty constraints from the requirements model • This work is partially supported by MOSTRO, SERENITY, STAMPS and SENSORIA projects

More Related