Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data and Applications Security Developments and Directions

Similar presentations


Presentation on theme: "Data and Applications Security Developments and Directions"— Presentation transcript:

1 Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II September 23, 2009

2 Outline Security Constraint Processing Use of Conceptual Structures

3 Security Constraint Processing
Security Constraints are rules that assign security levels to the data MLS/DBMS is augmented with an Inference Engine Inference Engine is the Inference Controller Integrated Architecture for Security Constraint processing Query, Update and Database design operations

4 Inference Engine Approach

5 Constraint Generation

6 Query Processor

7 Update Processor

8 Database Design Tool

9 Integrated Architecture

10 Release Control Management

11 Use of Conceptual Structures
Use conceptual structures to model the application E.g., semantic data models, semantic nets, conceptual graphs, etc. Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur

12 Multilevel Semantic Nets

13 Complex Multilevel Semantic Net
Italy Destination 20 years India Mediterranean Sea Skills Location REAGAN Smith Captain Date 16 June 2000 Skills Carries SUN Explosive Battle Passengers Management Type

14 ISA/AKO Links

15 Example Rules - II SHIPS WEAPONS (a) SHIP WATER VEHICLE AKO (c) REAGAN
ISA (b) PERSON Has Captain

16 Example Rules - II SHIPS WEAPONS (d) REAGAN SHIP ISA PERSON
Has Captain (e) India Destination COUNTRY

17 Applying Transfer Rules
India Destination Mediterranean India Sea Mediterranean Sea (b) Location Location REAGAN REAGAN Smith (a) Carries Carries Skills Type SUN Type Explosive SUN Explosive Battle Management Destination India Mediterranean Sea Location Smith REAGAN (c) Combines (a) and (b) Skills Carries Battle Type SUN Management Explosive

18 Security Constraints Carries Carries REAGAN REAGAN SHIPS SHIPS WEAPONS
SUN SUN WEAPONS (a) (a) Mediterranean Mediterranean Location Carries Carries REAGAN REAGAN SHIPS SHIPS SUN SUN (b) (b) Destination Destination COUNTRY COUNTRY

19 Security Constraint Violation - I

20 Security Constraint Violation - II

21 Universal and Existential Conditionals

22 Matching Vectors

23 Matching and Binding India Destination Location Mediterranean
SHIP: ALL X (a) Destination Carries New Delhi India Mediterranean Explosive Sea WEAPONS: SOME Y Capital Capital Destination Type Location REAGAN Smith Captain New Delhi India (b) FLORIDA FLORIDA Mediterranean Skills Sea Capital Destination Carries Carries Carries Location Battle REAGAN Management SUN Explosive MOON MOON Smith Captain Type Type Type Skills FLORIDA Carries (c ) Results from (a) and (b) (c ) Results from (a) and (b) Carries Battle Management SUN Explosive MOON Type Type

24 Negative Statements

25 X X Refutation LOCATION REAGAN SHIPS FLORIDA SHIPS WEAPONS
Pacific Ocean WEAPONS REAGAN DESTINATION (a) DESTINATION (b) Australia Australia WEAPONS WEAPONS FLORIDA FLORIDA DESTINATION SHIPS SHIPS WEAPONS REAGAN WEAPONS REAGAN REAGAN SHIPS Australia WEAPONS LOCATION DESTINATION X X (c ) Pacific Ocean Pacific Ocean Australia Australia WEAPONS WEAPONS (d) FLORIDA SHIPS REAGAN WEAPONS DESTINATION LOCATION Australia Pacific Ocean WEAPONS (e) WEAPONS

26 Directions Inference problem is still being investigated
Census bureau still working on statistical databases Need to find real world examples in the Military world Inference problem with respect to medial records Much of the focus is now on the Privacy problem Privacy problem can be regarded to be a special case of the inference problem


Download ppt "Data and Applications Security Developments and Directions"

Similar presentations


Ads by Google