Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
|
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [41] Runtime Enforcement of Security Policies on Black Box Reactive Programs
    Ngo, Minh
    Massacci, Fabio
    Milushev, Dimiter
    Piessens, Frank
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 43 - 54
  • [42] Adding Support for Automatic Enforcement of Security Policies in NFV Networks
    Basile, Cataldo
    Valenza, Fulvio
    Lioy, Antonio
    Lopez, Diego R.
    Pastor Perales, Antonio
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) : 707 - 720
  • [43] Efficient enforcement of security policies based on tracking of mobile users
    Atluri, Vijayalakshmi
    Shin, Heechang
    DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 237 - 251
  • [44] Security policies enforcement using finite and pushdown edit automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (04) : 319 - 336
  • [45] Security policies enforcement using finite and pushdown edit automata
    Danièle Beauquier
    Joëlle Cohen
    Ruggero Lanotte
    International Journal of Information Security, 2013, 12 : 319 - 336
  • [46] A Decentralized Authorization and Security Framework for Distributed Research Workflows
    Cardone, Richard
    Padhy, Smruti
    Black, Steve
    Stubbs, Joe
    Cleveland, Sean
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 741 - 746
  • [47] SECURITY FOR DISTRIBUTED SYSTEMS
    TRUEMAN, P
    DATA PROCESSING, 1986, 28 (04): : 187 - 190
  • [48] Distributed enforcement of unlinkability policies: Looking beyond the Chinese wall
    Kapadia, Apu
    Naldurg, Prasad
    Campbell, Roy H.
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 141 - +
  • [49] A Question of Access: decentralized control and communication strategies for security policies
    Ricker, S. L.
    WODES 2006: EIGHTH INTERNATIONAL WORKSHOP ON DISCRETE EVENT SYSTEMS, PROCEEDINGS, 2006, : 58 - +
  • [50] Enforcing security policies for distributed objects applications
    Popescu, BC
    Crispo, B
    Tanenbaum, AS
    Zeeman, M
    SECURITY PROTOCOLS, 2005, 3364 : 119 - 133