Towards a specification scheme for context-aware security policies for networked appliances

被引:0
|
作者
Watanabe, T [1 ]
Yamada, K [1 ]
Nagatou, N [1 ]
机构
[1] Natl Inst Informat, Software Res Div, Chiyoda Ku, Tokyo 1018430, Japan
关键词
D O I
10.1109/WSTFES.2003.1201363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes a secure execution scheme for mobile programs running in networked appliances. The potential threat we are considering is the malicious behaviour of the mobile programs. Our security architecture, called Taurus-1, adopts monitored execution as a basic mechanism for enforcing security policies at runtime. To describe a policy for this architecture, we designed an algebraic policy description language Polaris, in which we can specify a policy as a process consists of abstract events in a monitored program. The program is modified beforehand for effective detection of its malicious behaviour We discuss how Taurus-1 can provide a security enhancement mechanism for context-aware systems such as networked appliances, and discuss how to specify security policies for them.
引用
收藏
页码:65 / 68
页数:4
相关论文
共 50 条
  • [1] Specifying context-aware runtime security policies using an algebraic policy specification language
    Watanabe, T
    Yamada, K
    Nagatou, N
    [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2004, : 662 - 667
  • [2] Cerberus: A context-aware security scheme for smart spaces
    Al-Muhtadi, J
    Ranganathan, A
    Campbell, R
    Mickunas, MD
    [J]. PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM 2003), 2003, : 489 - 496
  • [3] CASPRE: A Context-Aware Standby Power Reduction Scheme for Household Appliances
    Lim, Junsung
    Son, Heesuk
    Shin, Byoungheon
    Lee, Dongman
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), 2016,
  • [4] A Generic Framework for Representing Context-Aware Security Policies in the Cloud
    Veloudis, Simeon
    Paraskakis, Iraklis
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    [J]. CLOUD COMPUTING AND SERVICES SCIENCE, CLOSER 2016, 2017, 740 : 338 - 358
  • [5] Programmable In-Network Security for Context-aware BYOD Policies
    Kang, Qiao
    Xue, Lei
    Morrison, Adam
    Tang, Yuxin
    Chen, Ang
    Luo, Xiapu
    [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 595 - 612
  • [6] Towards a Model-Driven Requirements Specification of Context-Aware Services
    Boudaa, Boudjemaa
    [J]. 10TH INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY AND INTERNET-BASED SYSTEMS SITIS 2014, 2014, : 194 - 200
  • [7] Using agents towards providing security on a context-aware architecture
    Vecchiato, Daniel
    Araujo, Nelcileno
    Maciel, Cristiano
    Viterbo, Jose
    El, Amal
    [J]. 1ST INTERNATIONAL WORKSHOP ON AGENTS & CYBERSECURITY, 2014,
  • [8] Towards context-aware security: An authorization architecture for Intranet environments
    Wullems, C
    Looi, M
    Clark, A
    [J]. SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 132 - 137
  • [9] A Quality-Aware Context Middleware Specification for Context-Aware Computing
    Li, Yuanping
    Feng, Ling
    [J]. 2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 879 - 884
  • [10] Automated Context Formalization for Context-aware Specification Approach
    Benabbou, Amel
    Nait-Bahloul, Safia
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2018, 9 (03) : 23 - 47