Optimized multi-domain secure interoperation using soft constraints

被引:0
|
作者
Belsis, Petros [1 ]
Gritzalis, Stefanos [1 ]
Katsikas, Sokratis K. [1 ]
机构
[1] Univ Aegean, Dept Informat & Commun Syst Engn, Lab Informat & Commun Syst Secur, Samos, Greece
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Building coalitions between autonomous domains and managing the negotiation process between multiple security policies in a multi-domain environment is a challenging task. The negotiation process requires efficient modeling methods for the determination of secure access states and demands support from automated tools aiming to support administrators and to minimize human intervention; thus making the whole process more efficient and less error-prone. In this paper we define a framework that enables the representation of policy merging between autonomous domains, as a constraint satisfaction problem, while remaining neutral in regard to the policy language. Role and permission hierarchies are modeled using the constraint programming formalism. Policy mappings are utilized in order to enable cross-organizational role assignment. Further optimization on policy mappings is achieved by casting the problem to a partially ordered multi-criteria shortest path problem.
引用
收藏
页码:78 / +
页数:2
相关论文
共 50 条
  • [41] Establishing RBAC-based secure interoperability in decentralized multi-domain environments
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 49 - 63
  • [42] Dynamic and secure management of VPNs in IPv6 multi-domain scenarios
    Martinez Perez, Gregorio
    Lopez Millan, Gabriel
    Garcia Clemente, Felix J.
    Gomez Skarmeta, Antonio F.
    COMPUTER COMMUNICATIONS, 2006, 29 (16) : 3122 - 3134
  • [43] A Secure Model Based on Hypergraph in Multilayer and Multi-domain Intelligent Optical Network
    Wu, Qiwu
    Lu, Jie
    WIRELESS COMMUNICATIONS, NETWORKING AND APPLICATIONS, WCNA 2014, 2016, 348 : 35 - 40
  • [44] Secure and cost-effective controller deployment in multi-domain SDN with BAGUETTE
    Feng, Wendi
    Liu, Chuanchang
    Cheng, Bo
    Chen, Junliang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 178
  • [45] Deploying secure cryptographic services in multi-domain IPv6 networks
    Millán, GL
    Clemente, FJG
    Pérez, MG
    Pérez, GM
    Skarmeta, AFG
    AINA 2005: 19th International Conference on Advanced Information Networking and Applications, Vol 2, 2005, : 785 - 789
  • [46] Verification of Secure Inter-operation Properties in Multi-domain RBAC Systems
    Gouglidis, Antonios
    Mavridis, Ioannis
    Hu, Vincent C.
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C), 2013, : 36 - 45
  • [47] Intelligent Fault Diagnosis of Aeroengine Sensor Based on Optimized Multi-Domain Features
    Li H.-H.
    Gou L.-F.
    Chen Y.-X.
    Li H.-C.
    Tuijin Jishu/Journal of Propulsion Technology, 2023, 44 (02):
  • [48] Product Graph Learning From Multi-Domain Data With Sparsity and Rank Constraints
    Kadambari, Sai Kiran
    Chepuri, Sundeep Prabhakar
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2021, 69 : 5665 - 5680
  • [49] Simulation of resource allocation policies in a multi-domain IP environment with QoS constraints
    Stanciu, Mihai
    Borcoci, Eugen
    Lupu, Radu
    REVUE ROUMAINE DES SCIENCES TECHNIQUES-SERIE ELECTROTECHNIQUE ET ENERGETIQUE, 2007, 52 (01): : 81 - 88
  • [50] Multi-Domain Alias Matching Using Machine Learning
    Ashcroft, Michael
    Johansson, Fredrik
    Kaati, Lisa
    Shrestha, Amendra
    2016 THIRD EUROPEAN NETWORK INTELLIGENCE CONFERENCE (ENIC 2016), 2016, : 77 - 84