JUCS - Journal of Universal Computer Science 11(1): 150-174, doi: 10.3217/jucs-011-01-0150
A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques
expand article infoValentina Casola, Rosa Preziosi§, Massimiliano Rak
‡ Dipartimento di Ingegneria dell'Informazione, Second University of Naples, Italy§ RCOST, Department of Engineering, University of Sannio, Italy
Open Access
In a world made of interconnected systems which manage huge amounts of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability to evaluate policies is becoming more and more relevant, especially when referred to the cooperation of services belonging to untrusted domains. We have focused our attention on Public Key Infrastructures (PKIs), at the state of the art security policies evaluation is manually performed by technical and organizational people coming from the domains that need to interoperate. However, policy evaluation must face uncertainties derived from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way for dealing with these issues. In this paper we propose a fuzzy technique to characterize a policy and to define a Reference Evaluation Model representing different security levels against which we are able to evaluate and compare policies. The comparison takes into account not only minimal system needs but evaluator s severity, too, furthermore it gives clear information regarding policy weakness that could be used to help security administrators to better enforce rules. Finally we present a case study which evaluates the security level of a legally recognized policy.
Policy, Public Key Infrastructure, Security Evaluation, Fuzzy Techniques K.6.5, K.4.2