Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
|
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [21] Enforcement of Security Properties for Dynamic MAC Policies
    Briffaut, J.
    Lalande, J. -F.
    Toinard, C.
    Blanc, M.
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 114 - +
  • [22] Trust-based enforcement of security policies
    Vigo, Roberto
    Celestini, Alessandro
    Tiezzi, Francesco
    De Nicola, Rocco
    Nielson, Flemming
    Nielson, Hanne Riis
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8902 : 176 - 191
  • [23] Distributed Enforcement of Sticky Policies with Flexible Trust
    Brown, Jordan
    Blough, Douglas M.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1202 - 1209
  • [24] An Enforcement Architecture for Security and Trust Policies in Federated Web-service-based Systems
    Wu, Zhengping
    Wang, Lifeng
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1002 - 1007
  • [25] Using Equivalence Relations for Corrective Enforcement of Security Policies
    Khoury, Raphael
    Tawbi, Nadia
    COMPUTER NETWORK SECURITY, 2010, 6258 : 139 - 154
  • [26] Dynamic Enforcement of Knowledge-based Security Policies
    Mardziel, Piotr
    Magill, Stephen
    Hicks, Michael
    Srivatsa, Mudhakar
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 114 - 128
  • [27] Trusted Enforcement of Application-specific Security Policies
    Schlegel, Marius
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 343 - 355
  • [28] Security Policies Enforcement Using Finite Edit Automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 229 (03) : 19 - 35
  • [29] Dynamic Security Policies Enforcement and Adaptation using Aspects
    Idrees, Muhammad Sabir
    Ayed, Samiha
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1374 - 1379
  • [30] Achieving dynamicity in security policies enforcement using aspects
    Ayed, Samiha
    Idrees, Muhammad Sabir
    Cuppens, Nora
    Cuppens, Frederic
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 17 (01) : 83 - 103