Εφαρμογή της συλλογιστικής κοινής λογικής σε πολιτικές ασφαλείας με τη χρήση λογισμού γεγονότων

View/ Open
Subject
Λογική, Συμβολική και μαθηματική ; Prolog (Γλώσσα προγραμματισμού) ; Διαδίκτυο (Internet) -- Μέτρα ασφαλείαςAbstract
Personal computers, information systems, corporate and home networks of either simple or complex configurations and even Critical Infrastructure networks interconnect through the Net. This connectivity defines the need for access control to and protection of the relevant systems, a need which is increasingly pressing especially when compared with isolated systems and networks. Access control rules are described via security policies which vary from simple to complex where assumptions exist regardless of whether they are obvious to users and administrators and quite often with a lot of exceptions. In such an environment the system administrators are expected to deploy, manage, and verify the integrity of what is applied to the equipment compared to the policy itself. The market has responded to the void created by such a need by providing ad-hoc tools that while evolving as time passes tend to prove Greenpsun’s empirical 10th law of software engineering (“Any sufficiently complicated C or FORTRAN program, contains an ad-hoc, informally specified, bug-ridden, slow implementation of half of Common Lisp”). This dissertation aims by using Mathematical Logic tools and PROLOG right from the start to provide for easier deployment, management and verification of security policies that should be in place. Via using this theoretical background powerful tools that can offer solid help to the daily tasks of the system administrator and the security manager are proposed.