Optimized multi-domain secure interoperation using soft constraints

被引:0
|
作者
Belsis, Petros [1 ]
Gritzalis, Stefanos [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Lab Informat & Commun Syst Secur, Samos, Greece
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Building coalitions between autonomous domains and managing the negotiation process between multiple security policies in a multi-domain environment is a challenging task. The negotiation process requires efficient modeling methods for the determination of secure access states and demands support from automated tools aiming to support administrators and to minimize human intervention; thus making the whole process more efficient and less error-prone. In this paper we define a framework that enables the representation of policy merging between autonomous domains, as a constraint satisfaction problem, while remaining neutral in regard to the policy language. Role and permission hierarchies are modeled using the constraint programming formalism. Policy mappings are utilized in order to enable cross-organizational role assignment. Further optimization on policy mappings is achieved by casting the problem to a partially ordered multi-criteria shortest path problem.
引用
收藏
页码:78 / +
页数:2
相关论文
共 50 条
  • [31] Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures
    Zhou, Xin
    Cushing, Reginald
    Koning, Ralph
    Belloum, Adam
    Grosso, Paola
    Klous, Sander
    van Engers, Tom
    de Laat, Cees
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 104 - 113
  • [32] Secure and Trustworthy Machine Learning/Artificial Intelligence for Multi-Domain Operations
    Rawat, Danda
    ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS III, 2021, 11746
  • [33] Soft-Label for Multi-Domain Fake News Detection
    Wang, Daokang
    Zhang, Wubo
    Wu, Wenhuan
    Guo, Xiaolei
    IEEE ACCESS, 2023, 11 : 98596 - 98606
  • [34] A fast and secure MP3 steganographic scheme with multi-domain
    Yang, Yunzhao
    Yi, Xiaowei
    Zhao, Xianfeng
    Zhang, Jinghong
    SIGNAL PROCESSING, 2022, 190
  • [35] Data dissemination and policy enforcement in multi-level secure multi-domain environments
    Son, Joon
    Hamouda, Essia
    Pannosian, Garo
    Bhuse, Vijay
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2024, 24 (3-4)
  • [36] Mosart, a generalized, multi-domain ray tracing program with optimized solver
    DeGeest, E
    Patzold, H
    ACUSTICA, 1996, 82 : S147 - S147
  • [37] Analysis of Multi-Domain Scenarios for Optimized Dynamic Power Management Strategies
    Zimmermann, Jochen
    Bringmann, Oliver
    Rosenstiel, Wolfgang
    DESIGN, AUTOMATION & TEST IN EUROPE (DATE 2012), 2012, : 862 - 865
  • [38] Multi-domain lightpath authorization, using tokens
    Gommans, Leon
    Xu, Li
    Demchenko, Yuri
    Wan, Alfred
    Cristea, Mihai
    Meijer, Robert
    de Laat, Cees
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (02): : 153 - 160
  • [39] Deep Reference Generation With Multi-Domain Hierarchical Constraints for Inter Prediction
    Liu, Jiaying
    Xia, Sifeng
    Yang, Wenhan
    IEEE TRANSACTIONS ON MULTIMEDIA, 2020, 22 (10) : 2497 - 2510
  • [40] A grammar-based web service enabling multi-domain distributed interoperation of Command/Control and simulation systems
    Pullen, J. Mark
    Makineni, Krishna
    McAndrews, Priscilla
    DS-RT 2007: 11TH IEEE INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL-TIME APPLICATIONS, PROCEEDINGS, 2007, : 137 - 144