Optimized multi-domain secure interoperation using soft constraints

被引:0
|
作者
Belsis, Petros [1 ]
Gritzalis, Stefanos [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Lab Informat & Commun Syst Secur, Samos, Greece
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Building coalitions between autonomous domains and managing the negotiation process between multiple security policies in a multi-domain environment is a challenging task. The negotiation process requires efficient modeling methods for the determination of secure access states and demands support from automated tools aiming to support administrators and to minimize human intervention; thus making the whole process more efficient and less error-prone. In this paper we define a framework that enables the representation of policy merging between autonomous domains, as a constraint satisfaction problem, while remaining neutral in regard to the policy language. Role and permission hierarchies are modeled using the constraint programming formalism. Policy mappings are utilized in order to enable cross-organizational role assignment. Further optimization on policy mappings is achieved by casting the problem to a partially ordered multi-criteria shortest path problem.
引用
收藏
页码:78 / +
页数:2
相关论文
共 50 条
  • [1] Decentralized Secure Interoperation in Multi-Domain Environments
    Feng Dengguo
    Wang Xingang
    Xu Zhen
    CHINESE JOURNAL OF ELECTRONICS, 2009, 18 (01): : 1 - 7
  • [2] An Attribute Mapping Technique for Secure Interoperation in Multi-domain Environments
    Lu, Jianfeng
    Yan, Xuan
    Liu, Yiding
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 181 - 184
  • [3] Integrating trust and role for secure interoperation in multi-domain environment
    Lu, Jianfeng
    Li, Ruixuan
    Lu, Zhengding
    Li, Bing
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 77 - 82
  • [4] Reasoning about secure interoperation using soft constraints
    Bistarelli, S
    Foley, SN
    O'Sullivan, B
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 173 - 186
  • [5] An RBAC framework for time constrained secure interoperation in multi-domain environments
    Piromruen, S
    Joshi, JBD
    WORDS 2005: 10TH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE, PROCEEDINGS, 2005, : 36 - 45
  • [6] A request-driven role mapping for secure interoperation in multi-domain environment
    Tang, Zhuo
    Li, Ruixuan
    Lu, Zhengding
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 83 - 90
  • [7] Request-driven role mapping framework for secure interoperation in multi-domain environments
    Li, Ruixuan
    Tang, Zhuo
    Lu, Zhengding
    Hu, Jinwei
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 193 - 207
  • [8] R2BAC: a risk-based multi-domain secure interoperation model
    Li, Rui-Xuan
    Hu, Jin-Wei
    Tang, Zhuo
    Lu, Zheng-Ding
    Tongxin Xuebao/Journal on Communications, 2008, 29 (10): : 58 - 69
  • [9] A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies
    Zhang, Yue
    Joshi, James. B. D.
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 25 - +
  • [10] A wavelet optimized adaptive multi-domain method
    Hesthaven, JS
    Jameson, LM
    JOURNAL OF COMPUTATIONAL PHYSICS, 1998, 145 (01) : 280 - 296