RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems

被引:0
|
作者
Aloulou, Houssem [1 ]
Loulou, Monia [1 ]
Kallel, Slim [1 ]
Kacem, Ahmed Hadj [1 ]
机构
[1] Lab ReDCAD, Sfax, Tunisia
关键词
Security policy; Mobile agent systems; Dynamic enforcement; Aspect-oriented Programming;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Defining security policies is a crucial stage for an efficient implementation of security within mobile agent systems. To enforce these policies in a reliable way, it is necessary to make use of formal techniques which offer enough flexibility and expressiveness, and which provide a rigorous reasoning about the security of mobile agent systems security. The migration of the agent between several systems can lead to inconsistencies between its policy and the policy of the system. These incoherencies may require a dynamic reconfiguration of the security policies of the system and the agent. This reconfiguration cannot be efficient without the use of mechanisms that improve the modularity of the security code. In this paper, we aim to dynamically enforce security policies in mobile agent systems in modular and reliable way. For this purpose, we combine formal methods and aspect oriented programming. We propose a three-step approach to enforce security policies in the form of aspects that will be generated through a reliable specification of security policies.
引用
收藏
页码:237 / 252
页数:16
相关论文
共 50 条
  • [1] Dynamic security framework for mobile agent systems: Specification, verification and enforcement
    Loulou, Monia
    Jmaiel, Mohamed
    Mosbah, Mohamed
    [J]. International Journal of Information and Computer Security, 2009, 3 (3-4) : 321 - 336
  • [2] Flexible security policies for mobile agent systems
    Montanari, R
    Stefanelli, C
    Dulay, N
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2001, 25 (02) : 93 - 99
  • [3] Enforcement of communications policies in software agent systems through mobile code
    Suri, N
    Carvalho, M
    Bradshaw, JM
    Breedy, MR
    Cowin, TB
    Groth, PT
    Saavedra, R
    Uszok, A
    [J]. IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 247 - 250
  • [4] Runtime Enforcement of Dynamic Security Policies
    Horcas, Jose-Miguel
    Pinto, Monica
    Fuentes, Lidia
    [J]. SOFTWARE ARCHITECTURE, ECSA 2014, 2014, 8627 : 340 - 356
  • [5] Enforcement of Security Properties for Dynamic MAC Policies
    Briffaut, J.
    Lalande, J. -F.
    Toinard, C.
    Blanc, M.
    [J]. 2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 114 - +
  • [6] Enforcing history-based security policies in mobile agent systems
    Dias, P
    Ribeiro, C
    Ferreira, P
    [J]. IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 231 - 234
  • [7] Formal enforcement of security policies on concurrent systems
    Langar, Mahjoub
    Mejri, Mohamed
    Adi, Kamel
    [J]. JOURNAL OF SYMBOLIC COMPUTATION, 2011, 46 (09) : 997 - 1016
  • [8] Dynamic Enforcement of Knowledge-based Security Policies
    Mardziel, Piotr
    Magill, Stephen
    Hicks, Michael
    Srivatsa, Mudhakar
    [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 114 - 128
  • [9] Compile-time enforcement of dynamic security policies
    Eyers, David M.
    Srinivasan, Sriram
    Moody, Ken
    Bacon, Jean
    [J]. 2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 119 - 126
  • [10] Dynamic Security Policies Enforcement and Adaptation using Aspects
    Idrees, Muhammad Sabir
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1374 - 1379