XML distributed security policy for clusters

被引:10
|
作者
Apvrille, A [1 ]
Pourzandi, M [1 ]
机构
[1] Ericsson Res Canada, Open Syst Lab, Mont Royal, PQ H4P 2N2, Canada
关键词
security policy; cluster; XML; distributed management; Linux;
D O I
10.1016/j.cose.2004.09.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the increasing use of clusters, efficient and flexible security has now become an essential requirement, though it has not yet been addressed in a coherent fashion for distributed systems. This paper presents a new security policy language for clusters: Distributed Security Policy (DSP). Based on XML, this language offers a precise and easy way to customize security of clusters. Contrary to other existing security policy languages, it is not limited to access control, and may be used for other security services such as cluster's inner communication. Finally, the paper also explains how this security policy is used in practice, and how it is transparently enforced onto all nodes of the cluster. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:649 / 658
页数:10
相关论文
共 50 条
  • [1] Clusters and security: Distributed security for distributed systems
    Pourzandi, M
    Gordon, D
    Yurcik, W
    Koenig, GA
    [J]. 2005 IEEE International Symposium on Cluster Computing and the Grid, Vols 1 and 2, 2005, : 96 - 104
  • [2] Access authorization policy for XML document security
    Jo, SM
    Kim, KT
    Kouh, HJ
    Yoo, WH
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 589 - 598
  • [3] Distributed security policy conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. COMPUTERS & SECURITY, 2013, 33 : 28 - 40
  • [4] Distributed Security Policy Conformance
    Montanari, Mirko
    Chan, Ellick
    Larson, Kevin
    Yoo, Wucherl
    Campbell, Roy H.
    [J]. FUTURE CHALLENGES IN SECURITY AND PRIVACY FOR ACADEMIA AND INDUSTRY, 2011, 354 : 210 - 222
  • [5] A new distributed security model for linux clusters
    Pourzandi, M
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 225 - 230
  • [6] Policy classes and query rewriting algorithm for XML security views
    Rassadko, Nataliya
    [J]. DATA AND APPLICATIONS SECURITY XX, PROCEEDINGS, 2006, 4127 : 104 - 118
  • [7] Maintaining consistency of the security policy in distributed environment
    Ngamsuriyaroj, S
    Keefe, TF
    Hurson, AR
    [J]. CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 179 - 186
  • [8] Multilevel Policy Based Security in Distributed Database
    Batra, Neera
    Singh, Manpreet
    [J]. ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 572 - 580
  • [9] Policy based interoperability in distributed security infrastructures
    Casola, V
    Mazzocca, N
    Mazzeo, A
    Vittorini, V
    [J]. CONCURRENT ENGINEERING: ENHANCED INTEROPERABLE SYSTEMS, 2003, : 1027 - 1034
  • [10] Reliable Security Policy in Mobile Distributed Network
    Suganthi, Bhuvana D.
    Manjuath, R.
    Aravindan, A.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1782 - 1786