Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
|
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [1] Formal enforcement of security policies on concurrent systems
    Langar, Mahjoub
    Mejri, Mohamed
    Adi, Kamel
    JOURNAL OF SYMBOLIC COMPUTATION, 2011, 46 (09) : 997 - 1016
  • [2] Security Policies in Distributed CSCW and Workflow Systems
    Ahmed, Tanvir
    Tripathi, Anand R.
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2010, 40 (06): : 1220 - 1231
  • [3] Formal Enforcement of Security Policies on Parallel Systems with Risk Integration
    Ziadia, Marwa
    Mejri, Mohamed
    CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 133 - 148
  • [4] ENFORCEMENT OF SECURITY POLICIES FOR COMPUTATION
    JONES, AK
    LIPTON, RJ
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1978, 17 (01) : 35 - 55
  • [5] Corrective Enforcement of Security Policies
    Khoury, Raphael
    Tawbi, Nadia
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 176 - 190
  • [6] Consistent policy enforcement in distributed systems using mobile policies
    Chapin, S
    Faatz, D
    Jajodia, S
    Fayad, A
    DATA & KNOWLEDGE ENGINEERING, 2002, 43 (03) : 261 - 280
  • [7] RDyMASS: Reliable and Dynamic Enforcement of Security Policies for Mobile Agent Systems
    Aloulou, Houssem
    Loulou, Monia
    Kallel, Slim
    Kacem, Ahmed Hadj
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2010, 5939 : 237 - 252
  • [8] Unified support for heterogeneous security policies in distributed systems
    Minsky, NH
    Ungureanu, V
    PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 131 - 142
  • [9] SASI enforcement of security policies: A retrospective
    Department of Computer Science, Cornell University, Ithaca, NY 14853, United States
    Proc. New Sec. Paradigm Workshop, 1600, (87-95):
  • [10] Specification and runtime enforcement of security policies
    Jin, Ying
    Zhang, Jing
    Zheng, Xiaojuan
    2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +