Maintaining consistency of the security policy in distributed environment

被引:1
|
作者
Ngamsuriyaroj, S [1 ]
Keefe, TF [1 ]
Hurson, AR [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
关键词
D O I
10.1109/IPCCC.2002.995149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work addresses the problem of maintaining the consistency of the security policy in a distributed environment. We consider a system composed of the Security Server and multiple Object Managers running on different machines. The Security Server defines the security policy in a small database and Object Managers enforce the policy replicated on each machine. Thus, the system is modeled as a replicated database. However, unlike a typical replicated database where transient inconsistency is often allowed for better performance, due to the very nature of the security policy database, our goal of consistency is one-copy serializability (ISR). Hence, for security concerns, the requirement for achieving ISR is unquestionable, while the requirement for good performance is also desirable.
引用
收藏
页码:179 / 186
页数:8
相关论文
共 50 条
  • [1] Maintaining consistency of the security policy using timestamp ordering
    Ngamsuriyaroj, S
    Keefe, TF
    Hurson, AR
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2002, : 164 - 170
  • [2] Maintaining consistency in distributed network games
    Moon, KS
    Muthukkumarasamy, V
    Nguyen, ATA
    Kim, HS
    [J]. 2005 13th IEEE International Conference on Networks Jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings 1 and 2, 2005, : 374 - 379
  • [3] Managing security policy in a large distributed Web Services environment
    Chang, SM
    Chen, QM
    Hsu, MC
    [J]. 27TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 610 - 615
  • [4] Replication and consistency in a distributed environment
    Breitbart, Y
    Korth, HF
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1999, 59 (01) : 29 - 69
  • [5] Distributed databases: Security, consistency, and replication
    Lungu, Ion
    Ghencea, Adrian
    [J]. INNOVATION AND KNOWLEDGE MANAGEMENT: A GLOBAL COMPETITIVE ADVANTAGE, VOLS 1-4, 2011, : 941 - 949
  • [6] Maintaining Arc Consistency Asynchronously in Synchronous Distributed Search
    Wahbi, Mohamed
    Ezzahir, Redouane
    Bessiere, Christian
    Bouyakhf, El Houssine
    [J]. 2012 IEEE 24TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2012), VOL 1, 2012, : 33 - 40
  • [7] Maintaining consistency of twin transaction model using mobility-enabled distributed file system environment
    Cuce, S
    Zaslavsky, A
    Hu, B
    Rambhia, J
    [J]. 13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 752 - 756
  • [8] Maintaining global consistency of temporal constraints in a dynamic environment
    Mouhoub, M
    [J]. DEVELOPMENTS IN APPLIED ARTIFICIAL INTELLIGENCE, 2003, 2718 : 779 - 788
  • [9] Distributed security policy conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. COMPUTERS & SECURITY, 2013, 33 : 28 - 40
  • [10] Distributed Security Policy Conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222