首页> 外文会议>International Conference on Software Engineering >How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
【24h】

How Good Is a Security Policy against Real Breaches? A HIPAA Case Study

机译:防止实际违规的安全策略有多好? HIPAA案例研究

获取原文

摘要

Policy design is an important part of software development. As security breaches increase in variety, designing a security policy that addresses all potential breaches becomes a nontrivial task. A complete security policy would specify rules to prevent breaches. Systematically determining which, if any, policy clause has been violated by a reported breach is a means for identifying gaps in a policy. Our research goal is to help analysts measure the gaps between security policies and reported breaches by developing a systematic process based on semantic reasoning. We propose SEMAVER, a framework for determining coverage of breaches by policies via comparison of individual policy clauses and breach descriptions. We represent a security policy as a set of norms. Norms (commitments, authorizations, and prohibitions) describe expected behaviors of users, and formalize who is accountable to whom and for what. A breach corresponds to a norm violation. We develop a semantic similarity metric for pairwise comparison between the norm that represents a policy clause and the norm that has been violated by a reported breach. We use the US Health Insurance Portability and Accountability Act (HIPAA) as a case study. Our investigation of a subset of the breaches reported by the US Department of Health and Human Services (HHS) reveals the gaps between HIPAA and reported breaches, leading to a coverage of 65%. Additionally, our classification of the 1,577 HHS breaches shows that 44% of the breaches are accidental misuses and 56% are malicious misuses. We find that HIPAA's gaps regarding accidental misuses are significantly larger than its gaps regarding malicious misuses.
机译:策略设计是软件开发的重要组成部分。随着安全漏洞种类的增加,设计解决所有潜在漏洞的安全策略变得不容易。完整的安全策略将指定规则以防止破坏。系统地确定所报告的违规行为违反了哪个策略条款(如果有的话)是识别策略差距的一种方法。我们的研究目标是通过开发基于语义推理的系统流程来帮助分析师衡量安全策略与报告的违规行为之间的差距。我们建议使用SEMAVER,这是一个框架,可通过比较各个政策条款和违规描述来确定政策对违规的覆盖范围。我们将安全策略表示为一组规范。规范(承诺,授权和禁止)描述了用户的预期行为,并正式确定了谁对谁负责以及对谁负责。违反对应于规范违反。我们开发了一种语义相似性度量,用于在表示策略条款的规范与已报告的违规行为所违反的规范之间进行成对比较。我们以《美国健康保险携带与责任法案》(HIPAA)为例进行研究。我们对美国卫生与公共服务部(HHS)报告的部分违规行为的调查显示,HIPAA与报告的违规行为之间存在差距,覆盖率达到65%。此外,我们对1577项HHS违规的分类显示,其中44%是偶然滥用,56%是恶意滥用。我们发现,HIPAA在意外滥用方面的差距明显大于在恶意滥用方面的差距。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号