MODEL-DRIVEN SECURITY FOR TRUSTED SYSTEMS

被引:0
|
作者
Alam, Masoom [1 ]
Khan, Shahbaz [1 ]
Alam, Quratulain [1 ]
Ali, Tamleek [1 ]
Anwar, Sajid [1 ]
Hayat, Amir [2 ]
Jaffar, Arfan [3 ]
Ali, Muhammad [1 ]
Adnan, Awais [1 ]
机构
[1] Inst Management Sci, Secur Engn Res Grp, Peshawar, Pakistan
[2] Natl Univ Sci & Technol, Sch Elect Engn & Comp Sci, Islamabad, Pakistan
[3] Natl Univ Comp & Emerging Sci, Fdn Adv Sci & Technol, Islamabad, Pakistan
关键词
Security; Trusted computing; Access control; Mobile platforms; Rights management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security management in information societies is becoming extremely challenging where the resources are open and ubiquitous. The policies of the classified object change with its usage depending on the environment and its internal states. A classified object will have many stakeholders, with varying number of rights over it, all along its life. The relationship of stakeholders with objects is of our prime interest, where the object will be derived and/or distributed in its original form. In this contribution, we have classified stakeholders and objects, while concentrating on the specification for objects' usage at the stakeholder end. This will allow us to deploy our tools in an emulated environment, where these high level specifications will transform, to platform independent administrative policies and administer the emulation in a dynamic manner. This work will further lead us to investigate and provide tooling support for more granular semantically integrated control for stakeholders on their objects in a ubiquitous environment. We have concentrated on resources focusing the mobile platforms, taking Android as our case study. We base our work on top of recognized standards like that provided by Trusted Computing Group's Mobile Phone Working Group. It allows us to use the strong service oriented business model available in information based societies.
引用
收藏
页码:1221 / 1235
页数:15
相关论文
共 50 条
  • [1] A model-driven framework for trusted computing based systems
    Alam, Masoom
    Seifert, Jean-Pierre
    Zhan, Xinwen
    [J]. 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, : 75 - +
  • [2] Model-driven security management of embedded service systems
    Illner, S
    Pohl, A
    Krumm, H
    [J]. IECON 2005: THIRTY-FIRST ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-3, 2005, : 2655 - 2660
  • [3] Model-driven security engineering of service oriented systems
    Breu, Ruth
    Hafner, Michael
    Innerhofer-Oberperfler, Frank
    Wozak, Florian
    [J]. INFORMATION SYSTEMS AND E-BUSINESS TECHNOLOGIES, 2008, 5 : 59 - +
  • [4] OpenPMF: A model-driven security framework for distributed systems
    Lang, U
    Schreiner, R
    [J]. ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 138 - 147
  • [5] Advances in Model-Driven Security
    Lucio, Levi
    Zhang, Qin
    Nguyen, Phu H.
    Amrani, Moussa
    Klein, Jacques
    Vangheluwe, Hans
    Le Traon, Yves
    [J]. ADVANCES IN COMPUTERS, VOL 93, 2014, 93 : 103 - 152
  • [6] Towards the Model-Driven Engineering of Security Requirements for Embedded Systems
    Roudier, Yves
    Idrees, Muhammad Sabir
    Apvrille, Ludovic
    [J]. 2013 3RD INTERNATIONAL WORKSHOP ON MODEL-DRIVEN REQUIREMENTS ENGINEERING (MODRE), 2013, : 55 - 64
  • [7] A Systematic Review of Model-Driven Security
    Nguyen, Phu H.
    Klein, Jacques
    Le Traon, Yves
    Kramer, Max E.
    [J]. 2013 20TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2013), VOL 1, 2013, : 432 - 441
  • [8] Model-Driven Security Analysis of Self-Sovereign Identity Systems
    Ding, Yepeng
    Sato, Hiroyuki
    [J]. 2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1687 - 1694
  • [9] Model-Driven Information Flow Security for Component-Based Systems
    Ben Said, Najah
    Abdellatif, Takoua
    Bensalem, Saddek
    Bozga, Marius
    [J]. FROM PROGRAMS TO SYSTEMS: THE SYSTEMS PERSPECTIVE IN COMPUTING, 2014, 8415 : 1 - +
  • [10] Trusted Compliance Checking on Blockchain with Commitments: A Model-Driven Approach
    Bertolini, Marcello
    Meroni, Giovanni
    Plebani, Pierluigi
    [J]. BUSINESS PROCESS MANAGEMENT FORUM, BPM 2023 FORUM, 2023, 490 : 3 - 19