Policy-based security management for enterprise systems

被引:0
|
作者
Mukkamala, R [1 ]
Chekuri, L [1 ]
Moharrum, M [1 ]
Palley, S [1 ]
机构
[1] Old Dominion Univ, Norfolk, VA 23529 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing growth in global enterprises and collaborations among the enterprises, security and trust have become essential for information systems. For example, within an enterprise, there may be a need to maintain security within each project group so the information sharing among the groups is controlled. Similarly, there may be a need to facilitate controlled and timed sharing of data among cooperating enterprises (e.g., coalitions). In this paper, we propose a policy-based security mechanism for such sharing in an enterprise. In particular, in our system, each user (or administrator) specifies restrictions on the use of resources at a particular node (or machine) in terms of a set of policy statements (NRPS and NTPS). Similarly, the owner of each object specifies the conditions on which certain operations can be performed on the object (ORPS and OTPS). Trusted policy enforcement agents (PEA), running at each node in the enterprise (or coalition), ensure that both node and object policies are enforced in the system. We show how the proposed system facilitates dynamic control at object-level and machine-level.
引用
收藏
页码:219 / 233
页数:15
相关论文
共 50 条
  • [1] Policy-based security management for ad hoc wireless systems
    Zheng, Harold
    Wang, Sherry
    Nichols, Robert A.
    [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
  • [2] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [3] User isolation and policy-based security management
    Rayes, MA
    Cheung, M
    [J]. SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
  • [4] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    [J]. EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [5] Policy-based management for enterprise and carrier ATN networking
    Volner, R
    Bores, P
    [J]. BEC 2004: Proceeding of the 9th Biennial Baltic Electronics Conference, 2004, : 315 - 318
  • [6] Policy-based management for enterprise and carrier IP networking
    Hamada, T
    Czezowski, P
    Chujo, T
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2000, 36 (02): : 128 - 139
  • [7] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [8] A Policy-based Security Framework for Storage and Computation on Enterprise Data in the Cloud
    De, Sourya Joyee
    Pal, Asim K.
    [J]. 2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4986 - 4997
  • [9] A policy-based approach to Wireless LAN security management
    Lapiotis, George
    Kim, Byungsuk
    Das, Subir
    Anjum, Farooq
    [J]. 2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 174 - 182
  • [10] Policy transformation techniques in policy-based systems management
    Beigi, MS
    Calo, S
    Verma, D
    [J]. FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 13 - 22