首页> 外文学位 >Security-Policy Analysis with eXtended Unix Tools Dartmouth Computer Science Technical Report TR2013-728.
【24h】

Security-Policy Analysis with eXtended Unix Tools Dartmouth Computer Science Technical Report TR2013-728.

机译:使用扩展的Unix工具进行安全策略分析Dartmouth计算机科学技术报告TR2013-728。

获取原文
获取原文并翻译 | 示例

摘要

During our fieldwork with real-world organizations--including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts are hard to manage. We observed three core limitations of security policy analysis that contribute to this difficulty. First, there is a gap between policy languages and the tools available to practitioners. Traditional Unix text-processing tools are useful, but practitioners cannot use these tools to operate on the high level languages in which security policies are expressed and implemented. Second, practitioners cannot process policy at multiple levels of abstraction but they need this capability because many high level languages encode hierarchical object models. Finally, practitioners need feedback to be able to measure how security policies and policy artifacts that implement those policies change over time.;We designed and built our eXtended Unix tools (XUTools) to address these limitations of security policy analysis. First, our XUTools operate upon context-free languages so that they can operate upon the hierarchical object models of high-level policy languages. Second, our XUTools operate on parse trees so that practitioners can process and analyze texts at multiple levels of abstraction. Finally, our XUTools enable new computational experiments on multi-versioned structured texts and our tools allow practitioners to measure security policies and how they change over time. Just as programmers use high-level languages to program more efficiently, so can practitioners use these tools to analyze texts relative to a high-level language.;Throughout the historical transmission of text, people have identified meaningful substrings of text and categorized them into groups such as sentences, pages, lines, function blocks, and books to name a few. Our research interprets these useful structures as different context-free languages by which we can analyze text. XUTools are already in demand by practitioners in a variety of domains and articles on our re- search have been featured in various news outlets that include ComputerWorld, CIO Magazine, Communications of the ACM, and Slashdot.
机译:在与真实组织(包括公钥基础结构(PKI),网络配置管理和电力网中的组织)的实地考察中,我们反复注意到,安全策略和相关的安全工件很难管理。我们观察到安全策略分析的三个核心局限性导致了这一困难。首先,政策语言和从业人员可以使用的工具之间存在差距。传统的Unix文本处理工具很有用,但是从业人员不能使用这些工具在表达和实现安全策略的高级语言上进行操作。其次,从业者不能在多个抽象级别上处理策略,但是他们需要这种功能,因为许多高级语言对分层对象模型进行编码。最后,从业人员需要反馈,以便能够评估安全策略和实现这些策略的策略工件如何随时间变化。我们设计并构建了扩展的Unix工具(XUTools),以解决安全策略分析的这些限制。首先,我们的XUTools使用上下文无关的语言,以便它们可以使用高级策略语言的分层对象模型。其次,我们的XUTools在解析树上运行,以便从业人员可以在多个抽象级别上处理和分析文本。最后,我们的XUTools启用了针对多版本结构化文本的新计算实验,并且我们的工具允许从业人员测量安全策略及其随时间的变化。就像程序员使用高级语言来提高编程效率一样,从业人员也可以使用这些工具来分析与高级语言相关的文本。在整个文本的历史传播过程中,人们已经确定了有意义的文本子字符串并将其分为几类例如句子,页面,行,功能块和书籍等。我们的研究将这些有用的结构解释为不同的上下文无关语言,可以用来分析文本。 XUTools已被各个领域的从业人员所需求,我们研究的文章已在包括ComputerWorld,CIO Magazine,ACM Communications和Slashdot在内的各种新闻媒体上发表。

著录项

  • 作者

    Weaver, Gabriel A.;

  • 作者单位

    Dartmouth College.;

  • 授予单位 Dartmouth College.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2013
  • 页码 225 p.
  • 总页数 225
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号