Managing security in object-based distributed systems using Ponder

合集下载

JIRA4官方用户管理手册

JIRA4官方用户管理手册

JIRA Administrator's Guide This manual contains information on administering your JIRA system: Getting HelpConfiguring the Layout and DesignCustomising the Look and FeelChoosing a Default LanguageConfiguring the Default Issue NavigatorConfiguring the Default DashboardUsing Dashboard GadgetsAdding a Gadget to the DirectoryConfiguring an Announcement BannerEnabling Logout ConfirmationUser and Group ManagementManaging UsersManaging GroupsManaging Project RolesMigrating User Groups to Project RolesEnabling Public Signup and CAPTCHAIntegrating JIRA with LDAPIntegrating JIRA with CrowdConfiguring Trusted ApplicationsViewing User SessionsProject ManagementDefining a ProjectManaging Project Role MembershipDefining a ComponentManaging VersionsCreating Release NotesConfiguring Project KeysConfiguring SecurityManaging Global PermissionsManaging Project PermissionsConfiguring Issue Level SecurityPreventing Security AttacksConfiguring Fields and ScreensConfiguring Built-in FieldsDefining 'Issue Type' Field ValuesAssociating Issue Types with ProjectsDefining 'Priority' Field ValuesDefining 'Resolution' Field ValuesDefining 'Status' Field ValuesTranslating Resolutions, Priorities, Statuses and Issue Types Adding a Custom FieldConfiguring a Custom FieldCreating Help for a Custom FieldSpecifying Field BehaviourAssociating Field Behaviour with Issue TypesConfiguring Rich-Text RenderersDefining a ScreenAssociating a Screen with an Issue OperationAssociating a Screen with an Issue TypeConfiguring WorkflowActivating WorkflowAdding a Custom EventConfiguring Email NotificationsCreating a Notification SchemeCustomising Email ContentCreating Issues and Comments from EmailConfiguring JIRA to Send SMTP MailUsing Gmail as a JIRA Mail ServerMigrating from Other Issue TrackersImporting Data From CSVImporting Data from BugzillaMigrating from Bugzilla 3.0.3Modifying the Bugzilla ImporterImporting Data From MantisImporting Data From FogBugzMoving or Archiving Individual ProjectsArchiving a ProjectSplitting a JIRA instanceIntegrating with a Source Control SystemIntegrating JIRA with CVS and ViewCVSIntegrating JIRA with SubversionIntegrating JIRA with PerforceIntegrating JIRA with ClearCaseIntegrating JIRA with FishEyeIntegrating with a Build Management SystemIntegrating JIRA with BambooConfiguring Global SettingsConfiguring JIRA OptionsSetting Properties and Options on StartupAdvanced JIRA configuration with jira-application.propertiesEnabling File AttachmentsEnabling Thumbnails for AttachmentsEnabling Sub-tasksEnabling Issue LinkingEnabling TrackbackEnabling Time TrackingConfiguring OAuthConfiguring OAuth ConsumersConfiguring OAuth Consumer Information for JIRAConfiguring an OAuth Service Provider in JIRA Server AdministrationIncreasing JIRA MemoryLogging and ProfilingLogging email protocol detailsUsing the Database Integrity CheckerPrecompiling JSP pagesDatabase IndexingBacking Up DataAutomating JIRA BackupsPreventing users from accessing JIRA during backups Using robots.txt to hide from Search EnginesRestoring DataRestoring a Project from BackupGenerating a Thread DumpSearch IndexingRe-Indexing after Major Configuration Changes Optimising PerformanceViewing your System InformationUpdating your JIRA License DetailsConfiguring JIRA's File Path SettingsAppendix A - Extending JIRAManaging JIRA's PluginsListenersServicesJelly TagsJIRA Toolkit (Customer Support Extensions)Developer GuidesBuilding JIRA from SourceHow to Make a JIRA PatchAPI DocumentationJIRA User's Guide issues projects Please see the for an introduction to the concepts of and .。

acquisition management division

acquisition management division

acquisition management divisionThe Acquisition Management Division (AMD) is a critical component of any organization that needs to acquire external resources to support its operations and growth. As businesses expand and diversify, the need for effective acquisition strategies becomes increasingly important. The Acquisition Management Division is responsible for overseeing all acquisition activities, ensuring they are aligned with the organization's strategic goals and objectives.The primary responsibilities of the Acquisition Management Division include identifying and analyzing potential acquisition targets, conducting due diligence, negotiating acquisition terms, managing the integration process, and ensuring the successful transition of acquired assets into the organization. They also work closely with other departments within the organization, such as finance, legal, and operations, to ensure a smooth and efficient acquisition process.To achieve these objectives, the Acquisition Management Division employs a range of tools and techniques. They use data analytics to identify trends and opportunities in the market, perform financial modeling to assess the financial viability of potential acquisitions, and conduct risk assessments to identify and mitigate potential risks associated with acquisitions.The success of the Acquisition Management Division is measured by the extent to which they contribute to the overall success of the organization. This is typically done through the evaluation of acquisition outcomes, such as the post-acquisition performance of the acquired assets, the integration process, and the overall strategic alignment of the acquisition with the organization's goals and objectives.In conclusion, the Acquisition Management Division plays a crucial role in supporting an organization's growth and strategic objectives. By effectively managing acquisition activities, they help organizations achieve their goals, expand their market presence, and build a competitive advantage in their industry.。

ABB卓越的机器人控制器IRC5介绍

ABB卓越的机器人控制器IRC5介绍
§ Install and configure the robot controller to your needs 根据您的需要安装和配置机器人 的控制器 § Setup and download RobotWare systems 配置和安装RobotWare § Easy and controlled change of system parameters 十分简便的更改系统参数
▪ Flush sides for reduced floor space 平齐侧面,节约空间
▪ All modules stackable on top of each other 所有模块位置任意组合
•Process module on
•Single cabinet •单柜式+过程柜
PPT文档演模板
ABB卓越的机器人控制器IRC5介绍
Distributability 可扩展
§ Place modules where they fit best 将模块放置在最合适的地方 § save floor space 节约空间 § optimize cost 降低成本
Up to 75 m (std 10 or 30)
唯一可用的自动负载识别 (德国客户)
PPT文档演模板
•Y•w
•Z•w •Y•t •Y’
•Z•t
•X•w
•Z’
•X•t •X’
•Back
ABB卓越的机器人控制器IRC5介绍
•Modular cabinet 模块化
PPT文档演模板
• Cabinet
ABB卓越的机器人控制器IRC5介绍
Module Family Concept 模块化
▪ Robust 非常稳定

保安培训单元14:保安安全威胁原则指导说明书

保安培训单元14:保安安全威胁原则指导说明书

Unit 14: Principles of Managing Security ThreatsDelivery guidanceApproaching the unitThis unit gives learners the opportunity to investigate key security roles, the key security threats faced by the UK and the strategies used by the protective services to manage them.Learners will gain an understanding of the threats arising from terrorism and the use of counter terrorist measures by the protective services. For learning aim C learners must produce a plan for a protective services response to a security threat. It is very important that learners are guided through their research for the unit, and advice and guidance is provided on safeguarding when researching some of the unit content. It may be beneficial for centres to develop resources that can be housed on their virtual learning environment that contain a balanced and appropriate range of information in relation to terrorism. It is vital that learners are advised not to simply undertake internet searches as this may expose them to views or images that can place the learner at risk.You could deliver this unit using a mix of theory (to introduce learners to the topics listed in the unit content), visits and guest speakers (to enable learners to apply the theoretical concepts they have learned).Delivering the learning aimsLearning aim AFor learning aim A learners should be given the opportunity to investigate the main security threats facing the UK protective services, how these are managed and the impact of security failures. Class discussions can be used to allow learners to further explore the concepts of security threats and strategies designed to manage security threats.Learners should be given the opportunity to carry out research on the impact of failure to stop a security threat.Learning aim BFor learning aim B, it would be beneficial to use class discussions to enable learners to explore the context of terrorism and reasons for its continued significance as a threat to security. Learners should also be introduced to counter terrorist measures. They must develop an understanding of UK counter terrorist strategy and the role of the main agencies that have been set up to tackle the threat of terrorism.Delivering learning aim B2 could be facilitated by external input. A guest speaker, who works within counter terrorism, could come in to discuss current tactics, techniques and strategies used against different types of threat. The speaker should also speak about the associated strengths, challenges and effectiveness of each of the strategies.Learning aim CFor learning aim C, learners must plan a protective service response to a security threat. Learners must develop a knowledge of the personnel who are specifically employed by the uniformed protective services with security as the primary focus of their work. They must also understand the powers of a protective services worker when managing security threats. You could introduce the unit with tutor presentations to deliver the theory behind the protective service responses to a security threat and the tasks carried out by protective service workers.Learners should be given the opportunity to explore and research the powers of different protective service workers when managing security threats. Presentations or role-plays could be used by learners to enable them to research and collect information about planning an effective response to a threat before they go on to plan their own responses.Assessment modelA Investigate the mainsecurity threats facing theUK protective services, how these are managed and theimpact of security failures A1 Types of security threatA2 Impact of failure to stop asecurity threatA3 Strategies designed tomanage security threatsA two-part report on a casestudy or article that:•evaluates security threats,the impact of failure, andthe measures and strategiesdesigned to manage thesethreats•evaluates the effectivenessof counter terroristmeasures with specificreference to how theyenable the protectiveservices and other agenciesto combat terrorismB Understand the threatsarising from terrorism, andthe use of counter terroristmeasures by the protectiveservices B1 Contexts for terrorism and reasons for its continuedsignificance as a threat tosecurityB2 Counter terrorist measuresC Plan a protective servicesresponse to a securitythreat C1 Work of protective servicesworkersC2 Powers of a protectiveservices worker whenmanaging security threatsC3 Planning an effectiveresponseA response plan to a givensecurity threat scenario that:•reviews the rolesplayed by protectiveservices workers inmanging securitythreats that evaluatesfactors andconsiderations beforesearching, justifyinghow these factors andconsiderationscontribute to aneffective search•sets out a response fortwo contrastingprotective services inmanaging a securitythreatAssessment guidanceThe recommended assessment for this unit includes two assignments. The first assignment focuses on learning aims A and B, the second on learning aim C.For the first assignment you could ask learners to produce a two-part report on acase study or article that evaluates security threats, the measures and strategies designed to manage these threats and the impact of failing to manage them. Thereport should evaluate the effectiveness of counter terrorist measures with specific reference to how they enable the protective services and other agenciesto combat terrorism.For the second assignment learners should produce a response plan to a given security threat scenario. The response should review the roles played by protective service workers in managing security threats. It should evaluate factors and considerations that must be borne in mind by workers investigatingthe threat and should justify how these factors and considerations contribute toan effective response to the threat. The response plan must also set out a response for two contrasting protective services in managing a security threat.Getting startedThis provides you with a starting place for one way of delivering the unit, based around the recommended assessment approach in the specification.Unit 14: Principles of Managing Security ThreatsIntroductionYou should give learners the opportunity to investigate and gain an insight into the main security threats faced by the protective services in the UK and look at the consequences of security failures. Learners must explore the strategies employed to manage these threats, looking at the work of key security workers within the protective services to understand what they do in order to protect the public. They should consider current contexts for the threat of terrorism and the use of counter terrorist measures. Finally, learners will need to investigate protective service responses to security threats, and plan a protective service response to a security threat. Throughout the delivery of this unit, learners should be given examples which are current at time of teaching.Learning aim A Investigate the main security threats facing the UK protective services, how these are managed and the impact of security failuresOutline the nature of the topics and the type of assessment that learners will be expected to complete for this unit. This unit is assessed by two summative assignments. Learners must investigate the main security threats facing the UK protective services, how these threats are managed and the impact of failing to stop a security threat. They must develop an understanding of the threats arising from terrorism and the use of counter terrorist measures by the protective services.You could start by introducing learners to the types of security threat. Use a class discussion to explore the main security threats and risks faced by the UK protective services.Use a teacher led presentation to give learners an overview of the types of security threats faced by the UK and provide them with recent examples. You should cover theUnit 14: Principles of Managing Security Threatsfollowing types of threat:•Terrorism (groups, objectives of groups and why they are a threat, tactics)•Weapons of mass destruction•Cyberspace (hostile actors, cyber espionage, computer network attack)•Espionage•Instability and conflict overseas•Serious and organised crime•General threats and risks that affect the UK public (crimes against property, crimes against people, cyber-attacks, fraud)You could ask learners to carry out individual research on a type of security threat. You could allocate these or allow learners to select their own.Learners should research their selected threat type, what it is, its aims/purpose and tactics. Learners could produce a presentation based on their findings which they can share with the group.You could use a tutor led presentation to provide learners with information about the impact of failing to stop a security threat. You should explain the impact of security failures on the protective services and wider society. During the presentation learners should make notes under the following headings: terrorism, loss of life, injury to people, damage to property, financial/economic loss and loss of public confidence.You could use a formative assessment to check learners understanding by asking them to produce an essay about the impact of security failures on the protective services. You could ask a guest speaker, who works in counter terrorism, to come in and discuss strategies designed to manage security threats. They should be able to explain the purpose and role of the main services responsible for the security and protection of the nation, its government and people. They could also discuss features of the key strategies used by the uniformed protective service in order to manage security threats. The guest speaker should be someone who currently works in, or has recent experience of working in, the uniformed protective service in a strategic role. They could be from the armed services, police or security services. Learners should take notes during the guest speaker’s delivery about the strategies designed to manage security threats.You could use a class discussion to further discuss the strategies employed to manage security threats and the management of the physical environment such as property, venues and public places.Learners must develop a knowledge of the main agencies set up to manage security threats. They could work in small groups to research an agency and then share their findings with the rest of the group. They must consider: the armed services, police, security services, MI5, Secret Intelligence Service (SIS/MI6) and GCHQ.Learners should be allowed time to write notes and to prepare for Assignment 1. (Assignment 1 covers learning aims A and B.)Learning aim B Understand the threats arising from terrorism and the use of counter terrorist measures by the protective servicesBefore commencing delivery of this unit, learners should be provided with guidance about safeguarding themselves when researching material for this topic.You could introduce this topic by leading a class discussion on the contexts for terrorism and reasons for its continued significance as a threat to security. You shouldUnit 14: Principles of Managing Security Threatshelp learners to understand that there are a range of different contexts for terrorism and groups that support it and for this reason terrorism can be a subjective term and its definition depends on the viewpoint of the individual.Ask learners to work in pairs to produce a factsheet with information about the factors that can affect terrorist causes and the associated level of threat against acountry. They should include information on the nature of threats from terrorism, changes to security threats over the past 20 years and the types of security threats.You could ask a guest speaker to come in and discuss their experience of counter terrorism. They should be able to explain current tactics, techniques and strategies for dealing with different types of threat. They could also discuss techniques and strategies used by government, military and law enforcement agencies to combat terrorism or to prevent terrorist military tactics. The guest speaker should be someone who currently works in a uniformed protective service or has worked in the armed services, police or security services. Learners should make notes during the guest speaker’s delivery about the current tactics, techniques and strategies used in counter terrorism for different types of threat.You could lead a class discussion to draw upon the information learned from the guest speaker. You could use a tutor led presentation to complete any areas of learning which require strengthening. Learners should have a good understanding of the UK Counter-terrorism strategy (CONTEST), its aim, the limbs and the initiatives used to underpin the 4Ps of CONTEST (pursue, prevent, protect, prepare).In pairs, learners could research the agencies and bodies who work within UK counter terrorism. Ask learners to research information about the following and to produce a booklet, presentation or report - National Cyber Security Centre (NCSC), National Crime Agency (NCA), Border Agency, multinational agencies (eg Interpol, Europol and the United Nations Counter-Terrorism Implementation Task Force (CTITF)). Include any other agencies in place at time of teaching. Learners should gather information about these bodies and agencies, their roles, purposes and significance.Learners should be allowed time to write notes and to prepare for Assignment 1. (Assignment 1 covers learning aims A and B.)Learning aim C Plan a protective services response to a security threatYou may introduce the topic by using a tutor-led presentation to deliver the theory behind the protective services responses to a security threat and the tasks carried out by protective service workers. Learners need to be aware that security is a key part of protective service work and that some personnel are specifically employed with security as the primary focus of their work.If possible, it would be useful for learners to visit an armed services centre to gain an understanding of the work of security workers from the armed services (for example Royal Military Police detectives, military police bodyguards or Ministry of Defence Police). It would be useful for learners to observe personnel carrying out their different roles, such as searches, patrolling premises and providing risk management.A centre visit to a police station, or a guest speaker from the police force visiting, would allow learners to gain first-hand experience of a police officer carrying out their duties in security. It would be useful for learners to gain an understanding of how the police investigate crimes and offences, respond to calls from the public and give advice to the public on personal safety and crime prevention.Unit 14: Principles of Managing Security ThreatsYou could lead a class discussion to enable learners to identify and discuss occasions where non-uniformed civilians undertake security work within protective service organisations. For example, specialist work in IT/cyber-related cases, forensic investigations, monitoring internet/email communications and financial service investigations. Learners should make notes during the discussion.Use a tutor-led presentation to deliver information about the powers of a protective service worker when managing security threats. Learners need to know how security workers in the protective services can access their powers through a range of key legislation.In pairs, ask learners to produce a PowerPoint presentation which they will deliver to the class. They need to research the key legislation used by security workers in the protective services when managing security threats. Learners should include information about the different legislation, their aims/purpose and if possible, examples of their application. The following legislation are examples that could be covered: Regulation of Investigatory Powers Act 2000, Justice and Security Act 2013, Counterterrorism and Security Act 2015. For the police: PACE 1984, Police Act 1996, Terrorism Act 2000, Criminal Justice and Public Order Act 1994, Police (Northern Ireland) Act 2003. For the armed services: Military Lands Act 1976, Section 24 PACE 1984, Armed Forces Act 2006, Section 3 of the Criminal Law Act 1967. For the security services: Security Services Act 1989. Statutes and regulations current at the time of teaching should be used.You could use a class discussion to discuss the ways that security services plan effective responses to security threats. You could follow this up with a tutor-led presentation to affirm learners’ knowledge and understanding of how to plan an effective response for different types of threat. Your presentation could cover the different types of responses planned, the aim or objective of the response, the agencies and personnel resources involved in the response and their roles and responsibilities and resource and logistical considerations. You should also cover how to test the effectiveness of the plan.You could also arrange for a guest speaker to come in and discuss their experience of planning effective responses to security threats. They should be able to explain their role and experience in a uniformed protective service, their role within security and how they have been involved in planning and testing the effectiveness of responses to security threats. The guest speaker should be someone who currently works in a uniformed protective service or has worked in a security role eg police service, armed services or security service.You could ask learners to use role-play scenarios to enable them to research and collect information about planning an effective response to a threat.Learners should be allowed time to write notes and to prepare for Assignment 2. (Assignment 2 covers learning aim C.)Details of links to other BTEC units and qualifications, and to other relevant units/qualificationsUnit 3: Global Affairs, the Media and the Protective ServicesUnit 8: Custodial CareUnit 15: Police Powers and the LawUnit 18: Criminal Investigation Procedures and PracticeTextbooksRonan K R and Johnston D M – Promoting Community Resilience in Disasters (Springer, 2005) ISBN 9780387238203Bolz F et al – The Counter terrorism Handbook: Tactics, Procedures and Techniques (CRC Press, 2005) ISBN 978-0849309649Clarke R V – Situational Crime Prevention: Successful Case Studies (Harrow and Heston, 1997) ISBN 9780911577389Kozlow C and Sullivan J – Jane’s Facility Security Handbook (Jane’s Information Group, 2000) ISBN 9780710622884JournalsEdgeFireFirefighter magazineInfo 4 securityNavy NewsPolicePrison Service JournalPrison Service NewsProfessional Security MagazineQuestRAF NewsSoldierWebsitesHealth and Safety Executive has a good website that can be found by searching online for ‘health and safety ’The UK government emergency planninghttps:///government/publications/emergency-preparednessNational Counter Terrorism Officehttps:///government/organisations/national-counter-terrorism-security-officeThe MI5 – Security Service https:///The Ministry of Defence https:///government/organisations/ministry-of-defenceThe North Atlantic Treaty Organization https://www.nato.int/The Royal United Services Institute https:///The United Nations https:///en/。

安全ppt课件英语

安全ppt课件英语

Safety accidents can be classified based on their causes and consequences. Common classifications include accidents caused by equipment failure, human error, natural disasters, and more.
Compare risks
Prioritize risks
Develop risk mitigation plans
Implement risk mitigation plans: Effective implementation of the developed risk mitigation plans is essential to manage the prioritized risks effectively. Regular monitoring and evaluation are required to ensure that the plans are achieving the desired results.
Security organization
Responsibilities
Establish a comprehensive security system that includes access control, monitoring, and alarm systems.
Define standard operating procedures for handling security incidents, managing vulnerabilities, and conducting risk assessments.

华为SecoManager安全控制器产品介绍说明书

华为SecoManager安全控制器产品介绍说明书

Huawei SecoManager Security ControllerIn the face of differentiated tenant services and frequent service changes, how to implementautomatic analysis, visualization, and management of security services, security policy optimization,and compliance analysis are issues that require immediate attention. Conventional O&M relies onmanual management and configuration of security services and is therefore inefficient. Securitypolicy compliance check requires dedicated personnel for analysis. Therefore, the approval is usuallynot timely enough, and risky policies may be omitted. The impact of security policy delivery onservices is unpredictable. That is, the impact of policies on user services cannot be evaluated beforepolicy deployment. In addition, as the number of security policies continuously increases, it becomesdifficult for security O&M personnel to focus on key risky policies. The industry is in urgent needof intelligent and automated security policy management across the entire lifecycle of securitypolicies to help users quickly and efficiently complete policy changes and ensure policy deliverysecurity and accuracy, thereby effectively improving O&M efficiency and reducing O&M costs.The SecoManager Security Controller is a unified security controller provided by Huawei for differentscenarios such as DCs, campus networks, Branch. It provides security service orchestration andunified policy management, supports service-based and visualized security functions, and forms aproactive network-wide security protection system together with network devices, security devices,and Big Data intelligent analysis system for comprehensive threat detection, analysis, and response.Product AppearancesProduct HighlightsMulti-dimensional and automatic policy orchestration, security service deployment within minutes• Application mutual access mapping and application-based policy management: Policymanagement transitions from the IP address-based perspective to the application mutual access relationship-based perspective. Mutual-access relationships of applications on the network are abstracted with applications at the core to visualize your application services so that you can gain full visibility into the services, effectively reducing the number of security policies. The model-based application policy model aims to reduce your configuration workload and simplify network-wide policy management.• Policy management based on service partitions: Policy management transitions from thesecurity zone-based perspective to the service partition-based perspective. Conventional network zones are divided into security zones, such as the Trust, Untrust, DMZ, and Local zones. In a scenario with a large number of security devices and a large network scale, factors of security zone, device, policy, service rollout, and service change are intertwined, making it difficult to visualize services and to effectively guide the design of security policies. However, if security policies are managed, controlled, and maintained from the perspective of service partitions, users need to pay attention only to service partitions and security services but not the mapping among security zones, devices, and services, which effectively reduces the complexity of security policy design.Service partition-based FW1untrusttrustDMZ XXX FW2untrust trustDMZ XXX FW3untrust trust DMZ XXX InternetGuest partition R&D partition Data storage partitionExternal service partition Internal service partition• Management scope of devices and policies defined by protected network segments to facilitate policy orchestration: A protected network segment is a basic model of security service orchestration and can be considered as a range of user network segments protected by a firewall.It can be configured manually or through network topology learning. The SecoManager Security Controller detects the mapping between a user service IP address and a firewall. During automatic policy orchestration, the SecoManager Security Controller automatically finds the firewall that carries a policy based on the source and destination addresses of the policy.• Automatic security service deployment: Diversified security services bring security assurance for data center operations. Technologies such as protected network segment, automatic policy orchestration, and automatic traffic diversion based on service function chains (SFCs) enable differentiated tenant security policies. Policies can be automatically tiered, split, and combined so that you can gain visibility into policies.Intelligent policy O&M to reduce O&M costs by 80%• Policy compliance check: Security policy compliance check needs to be confirmed by the security approval owner. The average number of policies to be approved per day ranges from several to hundreds. Because the tool does not support all rules, the policies need to be manually analyzed one by one, resulting in a heavy approval workload and requiring a dedicated owner to spend hours in doing so. The SecoManager Security Controller supports defining whitelists, risk rules, and hybrid rules for compliance check. After a policy is submitted to the SecoManager Security Controller, the SecoManager Security Controller checks the policy based on the defined check rules and reports the check result and security level to the security approval owner in a timely manner.In this way, low-risk policies can be automatically approved, and the security approval owner needs to pay attention only to non-compliant policy items, improving the approval efficiency and avoiding the issues that the approval is not timely and that a risky policy is omitted.• Policy simulation: Based on the learning result of service mutual access relationships, the policies to be deployed are compared, and their deployment is simulated to assess the impact of the deployment, effectively reducing the risks brought by policy deployment to services.• Redundant policy deletion: After a policy is deployed, redundancy analysis and hit analysis are performed for policies on the entire network, and the policy tuning algorithm is used, deleting redundant policies and helping you focus on policies closely relevant to services.Network collaboration and security association for closed-loop threat handling within minutes • Collaboration with network for threat handling: In a conventional data center, application deployment often takes a long time. The application service team relies on the network team to deploy the network; the network team needs to understand the requirements of the application service team to deploy a network that is suitable for the application service team. The SecoManager Security Controller learns mappings between service policies and security policies based on the network topology, and collaborates with the data center SDN management and control system (IMaster NCE-Fabric) or campus SDN management and control system to divert tenant traffic to corresponding security devices based on SFCs on demand. The SecoManager Security Controller automatically synchronizes information about the tenants, VPCs, network topology (including logical routers, logical switches, logical firewalls, and subnets), EPGs, and SFCs from the SDN management and control system and combines the learned application service mutual access relationships to automatically orchestrate and deliver security policies, implementing security-network synergy.• Collaboration with security: Advanced persistent threats (APTs) threaten national infrastructure of the finance, energy, government, and other sectors. Attackers exploit 0-day vulnerabilities, use advanced evasion techniques, combine multiple attack means such as worm and ransomware, and may remain latent for a long period of time before they actually initiate attacks. The Big Data security product HiSec Insight can effectively identify unknown threats based on network behavior analysis and correlation analysis technologies. The threat handling method, namely isolation or blocking, is determined based on the threat severity. For north-south threats, the SecoManager Security Controller delivers quintuple blocking policies to security devices. For east-west threats, isolation requests are delivered to the network SDN management and control system to control switches or routers to isolate threatened hosts.Product Deployment• Independent deployment: The SecoManager Security Controller is deployed on a server or VM as independent software.• Integrated deployment: The SecoManager Security Controller and SDN management and control system are deployed on the same physical server and same VM.Database• Collaboration with the SDN management and control system to detect network topology changes and implement tenant-based automatic security service deployment.• North-south threat blocking, east-west threat isolation, and refined SDN network security control through SFC-based traffic diversion.• Interworking with the cloud platform to automatically convert service policies to security policies. Product SpecificationsOrdering InformationNote: This product ordering list is for reference only. For product subscription, please consult Huawei representatives. GENERAL DISCLAIMERThe information in this document may contain predictive statement including, without limitation, statements regarding the future financial and operating results, future product portfolios, new technologies, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.Copyright © 2020 HUAWEI TECHNOLOGIES CO., LTD. All Rights Reserved.。

承包商管理指南英文

承包商管理指南英文

承包商管理指南英文Contractor management is a crucial aspect of any construction project. Effective contractor management ensures that the project runs smoothly, on time, and within budget. Therefore, it is essential to have a comprehensive understanding of contractor management guidelines and best practices.承包商管理是任何建筑项目中至关重要的一个方面。

有效的承包商管理确保项目顺利进行,按时完成,并在预算内完成。

因此,有必要全面了解承包商管理指南和最佳实践。

One of the key aspects of effective contractor management is establishing clear expectations from the outset. This includes outlining the scope of work, deliverables, timelines, and quality standards. By clearly defining these expectations, both the project owner and the contractor can align on the project's goals and deliverables.有效承包商管理的关键方面之一是从一开始就确立清晰的期望。

这包括概述工作范围、可交付成果、工作时间表和质量标准。

通过明确定义这些期望,项目业主和承包商都能对项目的目标和可交付成果达成一致。

Another important aspect of contractor management is the establishment of a robust communication channel. Open and transparent communication between the project owner and the contractor is essential for resolving issues, addressing concerns, and ensuring that the project stays on track. Regular progress meetings and updates can help facilitate this communication and maintain a collaborative working relationship.承包商管理的另一个重要方面是建立健全的沟通渠道。

英文版人力资源管理咨询工作汇报工作总结报告PPT

英文版人力资源管理咨询工作汇报工作总结报告PPT

Customer Care & Insight
Integrated Risk Management
COGNOS Banking Risk Performance – Credit Risk
COGNOS Risk Adjusted Profitability Blueprint
IBM Service Management for IRM
Representative Industries
Electronics Chemicals & Petroleum High-Tech Manufacturing
Automotive
The market has requested: More standardised
Today
Future
solutions, easy to integrate and more service oriented
Enterprise Marketing Management
MarketinCgoPmrmoecrecses & Demand Generation Solutions
Industry
Industry Frameworks & Industry Assets
Including: Energy and Utilities Retail Government/Defense Manufacturing Health Integration Media
Banking Extensions for Common Shared Services MDM Server
pureXMLTM Payments Bundles
Corporate Payments Scenario
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

MANAGING SECURITY IN OBJECT-BASED DISTRIBUTEDSYSTEMS USING PONDERNicodemos Damianou, Naranker Dulay, Emil Lupu, Morris Sloman Department of Computing, Imperial College, 180 Queen’s Gate, London SW7 2BZ{n.damianou, nd, e.c.lupu, m.sloman}@ABSTRACTSecurity management involves specification and deployment of access control policies as well as activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. The management actions to be performed when an event occurs depend on the enterprise policy. Reusable composite policy specifications are important to cater for the complexity of large enterprise information systems. Analysing policies for conflicts is essential for the safe operation of the system. This paper describes the Ponder language for specifying policies for security management of Distributed Systems. Ponder is declarative, strongly-typed and object-oriented which makes the language flexible, scalable and adaptable to a wide range of security requirements.1. INTRODUCTIONThe advent of inter-organisational internet-based networking and services, which require integration of large enterprise information infrastructures, make the task of managing security in such systems very challenging. Many current approaches to security management focus only on access control and are not scalable or adaptable to large-scale distributed systems. The recent work on Policy Based Management of networks and distributed systems (see /policies) provides promising solutions to these problems of security management.A policy is a rule that defines a choice in behaviour of a system. Separating the policy from the implementation of a system permits the policy to be modified in order to change the behaviour of a system, without changing its underlying implementation. The security community have developed a number of models relating to specification of mandatory and discretionary access control policy [3]. This has evolved into work on Role Based Access Control (RBAC) [14] and Role Based Management where a role may be considered a group of related policies pertaining to a position in an organisation [7, 9]. None of these approaches copes with all the aspects of the task of managing security in large enterprise distributed systems outlined below.Distributed Systems are changing from the traditional client-server model to a more dynamic service-oriented paradigm. The development of end user applications and the widespread usage of data networks have created a great demand for network architectures that can rapidly adapt to new user requirements and provide customised services to the clients. Various techniques have emerged for programming network elements to support adaptable services, for example Active Networks, Mobile Agents, Management by Delegation and Policy-based quality of service management. While all these methods support programming new functionality into network elements and host devices, they increase the security concerns regarding the access to network resources and services.We identify the following requirements for a security management policy language aimed at managing large enterprise information systems:• Provision and support for the specification of access control policies relating to large systems with millions of objects. This includes support for information filtering and delegation to cater for temporary transfer of access rights.• In very large systems, it must be possible to specify policies for groups of objects.• Provision and support for monitoring, logging and auditing of events such as security violations. This includes the specification of what actions to perform in response to the events. These are the active aspects of security policy specification and take the form of manager obligation policies.• Grouping of policy specifications is needed to form composite policies relating to roles, organisational units such as departments or to specific applications. This is essential to cater for the complexity of policy administration in large enterprise information systems. • Analysis of policies: It must be possible to analyse policies for conflicts and inconsistencies, which may lead the system to insecure states. In addition it should be possible to determine which policies apply to an object or what objects a particular policy applies to. Declarative languages are easier to analyse.• The policy specification language must be extensible and scalable. New security policies may arise in the future. It should be easy to add them to the language without major redesign. An object-oriented language provides a solution for this.This paper describes Ponder [4], a declarative object-oriented policy language for security management of distributed systems. The language is flexible, expressive and extensible to cover the wide range of security requirements implied by the current distributed systems paradigms identified above. Ponderis the result of experience gained in policy-based management at Imperial College over the past 10 years [7, 10, 16, 17].Section 2 of the paper describes domains as a meansof grouping objects to which policies apply Section 3 and 4 explain the support for access control policies in Ponder and how it can be used to specify security management policies. The composite policy structures in Ponder are described in section 5. Constraints, a very important feature of the language, are described in section 6. Section 7 discusses features of the language that make it both flexible and scalable: scripts and object-orientation. In section 8 we briefly compare Ponder with related work and section 9 presents conclusions.2. SUBJECT AND TARGET DOMAINSWe assume that all policies relate to objects with interfaces defined in terms of methods using an interface definition language. We use the term subject to refer to users, principles or manager agents which have management responsibility. A subject accesses target objects (resources or service providers) by invoking methods, so the granularity of protection for access control is an interface method. Manager agents manage target objects which provide a management interface.In large-scale systems it is not practical to specify policies for individual objects and so there is a need to be able to group objects to which a policy applies. For example, a log policy to check the security log files at 7:00am, may apply to all security managers within a particular region. An authorisation policy may specify that all members of a department have access to a particular service. Domains provide a means of grouping objects to which policies apply and can be used to partition the objects in a large system according to geographical boundaries, object type, responsibility and authority or for the convenience of human managers [16, 17]. Membership of a domain is explicit and not definedin terms of a predicate on object attributes. A domain does not encapsulate the objects it contains but merely holds references to object interfaces. A domain is thus very similar in concept to a file system directory but may hold references to any type of object, including a person. A domain, which is a member of another domain, is called a sub-domain of the parent domain. A sub-domain is not a subset of the parent domain, in that an object included in a sub-domain is not a direct member of the parent domain, but is an indirect member, c.f., a file in a sub-directory is not a direct member of a parent directory. An object or sub-domain may be a member of multiple parent domains. Details of domains are described in [16, 17].AB CD ESub-Domains and Overlapping Domains Domain Hierarchy (withoutmember objects) Figure 1. DomainsPath names are used to identify domains, e.g., domain E in figure 1 can be referred to as /A/B/E or /A/C/E as an object may have different local names with multiple parent domains. Policies normally propagate to members of sub-domains, so a policy applying to domain B will also apply to members of domains D and E. Domain scope expressions can be used to combine domains to form a set of objects for applying a policy, using union, intersection and difference operators.An advantage of specifying policy scope in terms of domains is that objects can be added and removed from the domains to which policies apply without having to change the policies. A policy can select a subset of members of a domain and it’s sub-domains, to which it applies, by means of a constraint in terms of object attributes.3. ACCESS CONTROL POLICIESAccess control is concerned with limiting the activity of legitimate users who have been successfully authenticated. Discretionary Access Control (DAC) is a means of restricting access to objects based on the identity of the subjects and/or groups to which they belong [1, 15]. With DAC, access control is at the discretion of the user. The controls are discretionary in the sense that a subject with certain access permissions can pass those permissions on to any other subject. Delegation is an important part of any system supporting DAC, and is incorporated into the Ponder framework.3.1 AuthorisationAuthorisation policies define what activities a member of the subject domain can perform on the set of objects in the target domain. These are essentially access control policies to protect resources and services from unauthorized access. Constraints can be specified to limit the applicability of policies based on time or values of the attributes of the objects to which the policy refers. Constraints are discussed in section 6. A positive authorisation policy defines the actions that subjects are permitted to perform on target objects. A negative authorisation policy specifies the actions that subjects are forbidden to perform on target objects. Authorisation policies are implemented on the target host by an access control agent.inst auth+ switchPolicyOps {subject/NetworkAdmin;action load(), remove(), enable(), disable();target<Policy> /Nregion/switches }Members of the NetworkAdmin domain are authorised to load, remove, enable or disable objects of type Policy in the Nregion/switches domain. The domain could contain other typesof objects as well.inst auth- testRouters {subject /testEngineers/trainee;action performance_test();target/routers }Trainee test engineers are forbidden to perform performance tests on routers.The specification of negative authorisation policies complicates the enforcement of authorisation in a system. However, there are reasons to support the provision for negative authorisation policies. Administrators often express high-level access control in terms of both positive and negative policies; retaining the natural way people express policies is important and provides greater flexibility. Negative authorisation policies can also be used to temporarily remove access rights from subjects if the need arises. In addition, many security platforms (e.g. Windows NT) include the specification of negative access rights.3.2 InformationFilteringPositive authorisation policies may include filters to transform input or output parameters associated with their actions, based on attributes of the subject or target or on system parameters (e.g. time). For example people within a department can find out location information ona departmental member at the granularity of a room but external people can only determine whether the person isat work or out. If the same operation is used to get the information then a filter is required. Another example from the database world is when a payroll clerk is only permitted to read personnel records of employees belowa particular grade. Although these are a form of authorisation policies they differ from the normal ones in that it is not possible for an external authorisation agent to make an access control decision, based on whether or not an operation, specified at the interface to the target object, is permitted. Essentially the operation has to be performed and then a decision made on whether to allow results to be returned to the subject or whether the results need to be transformed.inst auth+ filter1 {subject /Agroup + /Bgroup;target USAStaff – NYgroupaction VideoConf(BW, Priority){ in BW=2 in Priority=3 }if (time.after("1900")) {in BW=2 in Priority = 1 } } Members of Agroup plus Bgroup can set up a video conference with USA staff except the New York group. If the time is later than 5:00pm then the video-conference takes parameters: bandwidth = 2 Mb/s, priority = 1. Otherwise the first filter restricts the parameters to bandwidth = 2 Mb/s, priority = 3. 3.3 DelegationDelegation is often used in access control systems to cater for the temporary transfer of access rights. However the ability of a user to delegate access rights to another must be tightly controlled by security policies. This requirement is critical in systems allowing cascaded delegation of access rights. A delegation policy permits subjects to grant privileges, which they possess, to grantees to perform an action on their behalf e.g. passing read rights to a printer spooler in order to print a file. A delegation policy is always associated with an authorisation policy which specifies the access rights that can be delegated. Negative delegation policies forbid delegation.inst deleg+ (switchPolicyOps) {grantee /DomainAdmin;action enable(), disable() }The above delegation policy accepts the switchPolicyOps auth+ policy from section 3.1 as a parameter. It states that the subject of that authorisation policy (Network-Admin), which is implicit in this policy, can delegate the enable and disable actions on policies from the domain /Nregion/switches to grantees in the domain /DomainAdminA Delegation policy specifies the authority to delegate, it does not control the actual delegation and revocation of access rights. It is implemented as an authorisation policy that authorises the subject (grantor) to execute the method delegate on the run-time system with the grantee as the parameter of the method. At run-time, when the subject executes the delegate method, a separate authorisation policy is created by trusted components of the access control system, with the grantee as the subject. Similarly the revoke method deletes or disables that second authorisation policy.4. SECURITY MANAGEMENT POLICIESSecurity management policies specify actions that must be performed when certain events occur and provide the ability to respond to changing circumstances if there is a need to do so to keep the system secure. Security management policies specify what actions must be specified when security violations occur and who must execute those actions; what auditing and logging activities must be performed, when and by whom. Security management policies can be used to handle cases of intrusion detection; policies can be set up to respond to the monitoring of security related activities, report suspicious activity and enact further surveillance or increase security measures in case of intrusions or attempted security violations. A security management policy might enable or disable access control policies accordingly to increase the degree of security provided by the system. Another example is denial of service; policies can be defined to respond to the access to resources or services and report to administrators or require managers to take certain actions when the number of simultaneous accesses has reach a specified limit. Similarly, policies may be written to alert systemadministrators when disk spaces reach critical limits, thus preventing denial of service attacks.4.1 ManagerObligationSecurity management activities can be specified in Ponder with Obligation policies, which are event-triggered and define the activities subjects (human or automated manager agents) must perform on objects in the target domain. Events can be simple, i.e. an internal timer event, or an external event notified by monitoring service components e.g. a temperature exceeding a threshold or a component failing. Composite events can be specified using event composition operators.inst oblig LoginFailure {on3*loginfail(userid);subject s = /NRegion/SecAdmintarget t = /NRegion/users ^ {userid}do t.disable() -> s.log(userid) }This policy is triggered by 3 consecutive loginfail events with the same userid. The NRegion security administrator (SecAdmin) disables the user with userid in the /NRegion/users domain and then logs failed userid by means of a local operation performed in the SecAdmin object. The ‘->’ operator is used to separate a sequence of actions in an obligation policy.inst oblig FirewallTraffic {on high_reject_rate(fwHostId, eventId);subject s = /firewalls/SecAdmintarget/externalFirewalls/fwHostIddo s.investigate(fwHostId) -> s.log(eventId) }If the number of incoming packets that are dropped due to packet-filter restrictions at a firewall with hostId, fwhostId, is more than a predefined threshold within a small interval (say 30 seconds), a high_reject_rate event is generated by the monitoring service, since this may be cause for a security concern. This event then triggers the above obligation policy that causes the firewall security administrator to log the event and investigate it for further assessment.Backing Policies are security related policies needed in situations where a subject requires the backing of a number of other principals in order to perform an action e.g. a chairman must have the backing of the majority of the board members in order to call an extraordinary meeting. In Ponder we can use authorisation and obligation policies to specify backing assuming that the backing condition can be specified and monitored by the underlying monitoring service, and then specified as an event to trigger obligation policies.inst auth+ b1 {subject chairman;action CallExtraMeeting();target shareholders }inst oblig b3 {on (NoMembers/2+1)*votes(yes);subject trusted_agent;do enable();target policies/b1 } inst oblig b2 {on ExtraMeeting;subject chairman;do CallExtraMeeting();target shareholders }inst oblig b4 {on (NoMembers/2+1)*votes(yes);subject trusted_agent;do ExtraMeeting();target chairman }For the chairman example, we need an authorisation policy (b1) authorising the chairman to call an extraordinary meeting and an obligation (b2) triggered by an event generated after a majority of yes vote events have been received. The authorisation policy is enabled only when a trusted agent enables it (in b3). The trusted agent obligation policy is triggered by the same backing event. We acknowledge the fact that arbitrary backing policies probably require a separate scripting language to specify the backing condition.4.2 RefrainPoliciesRefrain Policies define the actions that subjects must refrain from performing (must not perform) on target objects and like obligations they are implemented by the subject. Refrain policies act as restraints on the actions that managers perform. They are in essence a form of subject-based access control. With refrain policies we can specify negative access control in much the same way we do that with negative authorisation policies, but have subjects enforce it. Refrain policies are used for situations where negative authorisation policies are inappropriate; we can not trust the targets to enforce the policies (they may not wish to be protected from the subject).inst refrain testingRes {subject s=/test-engineers;action DiscloseTestResults();target/analysts + /developerswhen s.testing_sequence = "in-progress" }This refrain policy specifies that test engineers must not disclose test results to analysts or developers when the testing sequence being performed by that subject is still in progress, i.e., a constraint based on the state of subjects. Analysts and developers would probably not object to receiving the results and so this policy is not a good candidate for a negative authorisation.5. STRUCTURING POLICY SPECIFICATIONSSecurity management in large systems with millions of objects is impossible without the ability to group security policies and structure them to reflect organisational structure, preserve the natural way system administrators operate or simply provide reusability of common definitions, easing the task of policy administrators. Ponder composite policies are used to that end.5.1 GroupsThis is a generic packaging construct to group related policies together for the purposes of policy organisation and reusability. A set of related policy specifications and related constraints are grouped together within a syntactic scope with shared declarations. This is a common concept in many programming environments. Reusability can be achieved by specifying groups as types, parameterised with any policy element and then instantiating them multiple times. The criteria for grouping policiestogether may be application specific. The policies may reference the same targets, relate to the same department, concern a particular application, or have no obvious semantic relation apart from helping administrators organise and reuse specifications. For instance, the policies specified in section 4.1 to solve the simple backing example can be grouped together:inst group backingGroup {//… the policies to handle backing go here }5.2 RolesRole is a very overloaded term within the security community. In the RBAC community a role is a collection of users and their permissions. In Ponder roles also include the duties of the managers. A Role provides a semantic grouping of policies with a common subject, generally pertaining to a position within an organisation such as department manager, project manager, analyst or ward-A nurse. Specifying organizational policies for human managers in terms of manager positions rather than persons permits the assignment of a new person to the manager position without re-specifying the policies referring to the duties and authorizations of that position.Figure 2. Roles – Subject domainOrganisational positions can be represented as domains and we consider a role to be the set of authorisation, obligation, refrain and delegation policies with the Subject Domain of the role as their subject. A role is thus a special case of a group, in which all the policies have the same subject. A person or automated agent can then be assigned to or removed from the position domain without changing the policies as explained in [9]. See [8] for a discussion of the differences between RBAC and our Roles.The following role example includes the specification of the subject domain after the ‘@’.inst role SecurityManager {inst auth+A1 { … }inst oblig O1 { … }inst group G { … }…} @ /roles/positionDomains/SM5.3 ManagementStructuresMany large organisations are structured into units such as branch offices, departments, wards in a hospital etc., which have a similar configuration of roles and policies. Ponder supports the notion of management structures to define the configuration of policies, roles and nested management structures relating to organisational units. For example a management structure would be used to define a branch in a bank or a department in a university. The roles, groups and individual policies related with a branch/department can be grouped together in this management structure. The management structure can be specified as a type and then instantiated for different branches/departments which exhibit the same policy characteristics. Types are explained later in the paper.6. CONSTRAINTSAn important element of each policy is the set of conditions under which the policy is valid. This information must be explicit in the specification of the policy. The validity of a policy however, may depend on other policies existing or running in the system within the same scope or context. Those conditions are usually impossible or impractical to specify as part of each policy. We need to specify those as part of a group of policies. It is thus useful to divide the constraints in two categories: constraints for single policies and constraints for groups of policies which we call meta policies. A subset of the Object Constraint Language [13] is used to specify constraints in Ponder as OCL is simple to understand and use and it is declarative – each OCL expression is conceptually atomic and so the state of the objects in the system cannot change during evaluation.6.1 Basic-PolicyConstraintsIn general these limit the applicability of a policy. The constraint is expressed in terms of a predicate, which must evaluate to true for the policy to apply. Policy constraints can be considered as conjunctions of basic constraints, which can be either time-based constraints, or status-based constraints. The analysis of a set of policies can then be substantially improved since time-based constraints can be compared for possible overlap and state based constraints can be either simultaneously satisfied or mutually exclusive if they relate to states of the same system component. We separate the different types of constraints based on:• Subject/target state – the constraint is used to select a subset of the objects in the subject or target domains based on the object state as reflected in terms of attributes at the object interface.• Action/event parameters – constraints can be based on action or event parameter values.• Time constraints specify the validity periods for the policy. A time library object is provided with Ponder to specify time constraints.The policy compiler can resolve the different types of constraints at compile time and separate the constraints in order to aid in the analysability of policies.The following is the same example policy specified in section 3.1, only this time we use a constraint on the subject status to specify it, instead of organising the trainee-test-engineers in a separate sub-domain.inst auth- testRouters { subject s =/testEngineers; action performance_test();target /routers; when s = "trainee" }inst auth+ filter1 { subject /Agroup + /Bgroup; target USAStaff – NYgroupaction VideoConf(BW, Priority); when time.between("1600", "1800") } Members of Agroup plus Bgroup can set up a video conference with USA staff except the New York group. If the time is later than 5:00pm then the video-conference takes parameters: bandwidth = 2 Mb/s, priority = 1. Otherwise the first filter restricts the parameters to bandwidth = 2 Mb/s, priority = 3. The time-based constraint added limits the policy only between 4:00pm and 6:00pm.6.2 Meta PoliciesMeta policies specify policies about the policies within a composite policy and are used to define application specific constraints. We specify meta policies for groups of policies, i.e. policies within a specific scope, to express constraints which limit the permitted policies in the system, or disallow the simultaneous execution of conflicting policies.Following are some examples in which meta policies can be used to specify application dependent constraints on groups of policies.6.2.1 Self-Management“There should be no policy authorising a manager to retract policies for which he is the subject”. From [7]. This happens within a single authorisation policy with overlapping subjects and targets. Here's how the example given could be specified as a meta policy in Ponder:inst meta selfManagement1 raises selfMngmntConflict(pol) { [pol] = this.authorisations->select(p |p.action->exists(a | = "retract" and a.parameter->exists(p1 | ="policy"and p1.subject = p.subject))) pol->notEmpty }The body of the policy contains two OCL expressions. The first one operates on the authorisations set (an attribute of the meta policy itself) of the meta policy (‘this’ refers to the current object – in this case the meta policy), and selects all policies (p) with the following characteristics: the action set of p contains an action whose name is “retract”, and whose parameters include a policy object with the same subject as the subject of policy p. The second OCL expression is a Boolean expression; it returns true if the pol variable which is returned from the first OCL expression is not empty. If the result of this last expression is true, the exception specified in the raises-clause executes. It receives the pol set with the conflicting policies as a parameter.6.2.2 Separation of DutyDynamic separation of duty can be easily specified in Ponder as constraints in authorisation policies, byaccessing attributes of the objects. In the following example, the same user from the accountants domain can not both issue and authorise the same cheque.inst auth+ sepDuty {subject s = accountants; action approvePayment; target t = chequeswhen s.id <> t.issuerID }Static separation of duty is handled using meta-policies since it involves constraints on groups of objects. The following static separation of duty example states that the same subject cannot both submit and approve the budget for a project in a company.inst meta budgetDutyConflict raises conflictInBudget(z) { [z] = self.policies->select(pa, pb |pa.subject->intersection(pb.subject)->notEmpty and pa.action->exists(act | = ‘submit’) and pb.action->exists(act | = ‘approve’) and pb.target->intersection(pa.target)->oclIsKindOf(budget)) z -> notEmpty }7. FLEXIBILITY, EXTENSIBILITY,SCALABILITY7.1 Scripts as ActionsAn obligation action can be defined as a script using any suitable scripting language to specify a complex sequence of activities or procedures with conditional branching. Scripts are implemented as objects and stored in domains. Thus policies can be specified with scripts as targets. Access to scripts can thus be controlled if required.Scripts sometimes make it simpler to specify policies. With a script we can specify an action to move a policy from a domain /D1 to a domain /D2. Specifying an authorisation to achieve this without considering this script is problematic: there are two targets to the policy, domain D1 and domain D2. But if we use the script then we have only one target, the script itself.inst auth+ A { subject /domainAdmin; action execute; target domainMove(A,B) ; when A=”/D1” and B=”/D2”} Domain administrators are allowed to execute the script object ‘domainMove’ when the parameters to it are /D1 and /D2.7.2 Object-orientation and InheritanceThe object-oriented model of the language provides extensibility, scalability and flexibility. Extensibility is achieved using the object model of the language (figure 3). This allows new policy types that may be identified in the future to be defined as sub-classes of existing abstract policy classes. The language provides scalability by allowing users to define policy types, instantiate them and extend them with inheritance by specialisation at an infinite depth.Any policy element can be passed as a parameter to。

相关文档
最新文档