The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET

被引:2
|
作者
Cheng, Yuu-Heng
Raykova, Mariana
Poylisher, Alex
Alexander, Scott
Eiger, Martin
Bellovin, Steve M.
机构
关键词
policy-based management; MANET; computer network security;
D O I
10.1109/POLICY.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzantine faults. The Zodiac architecture poses a set of unique system security, performance, and usability requirements to its policy-based management system (PBMS). In this paper, we identify theses requirements, and present the design and implementation of the Zodiac Policy Subsystem (ZPS), which allows administrators to securely specify, distribute and evaluate network control and system security policies to customize Zodiac behaviors. ZPS uses the Keynote language for specifying all authorization policies with simple extension to support obligation policies.
引用
收藏
页码:174 / 177
页数:4
相关论文
共 50 条
  • [1] POSITIF: a policy-based security management system
    Basile, Cataldo
    Lioy, Antonio
    Perez, Gregorio Martinez
    Garcia Clemente, Felix J.
    Skarmeta, Antonio F. Gomez
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 280 - 280
  • [2] Performance analysis of DRAMA: A distributed policy-based system for MANET management
    Chiang, Cho-Yu Jason
    Demers, Stephanie
    Gopalakrishnan, Praveen
    Kant, Latha
    Poylisher, Alex
    Cheng, Yuu-Heng
    Chadha, Ritu
    Levin, Gary
    Li, Shihwei
    Ling, Yibei
    Newman, Scott
    LaVergne, Lorraine
    Lo, Richard
    MILCOM 2006, VOLS 1-7, 2006, : 1039 - +
  • [3] The development of policy proxy agent in policy-based network security management system
    Information Security Research Division, Electronics and Telecommunications Research Institute, 161, Gajeong-dong, Yuseong-gu, Daejeon City 305-350, Korea, Republic of
    WSEAS Trans. Commun., 2007, 1 (236-240):
  • [4] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [5] MANET Security Through a Distributed Policy-Based Evaluation of Node Behaviour
    Tajalli-Yazdi, Arash
    Lutfiyya, Hanan
    Kidston, David
    2015 INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2015, : 923 - 928
  • [6] User isolation and policy-based security management
    Rayes, MA
    Cheung, M
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 75 - 79
  • [7] Policy-based security management for enterprise systems
    Mukkamala, R
    Chekuri, L
    Moharrum, M
    Palley, S
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY XVIII, 2004, 144 : 219 - 233
  • [8] A policy-based security model for web system
    Xie, WX
    Ma, HD
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 187 - 191
  • [9] Policy-based workflow management system
    Chen, S
    Ouyang, S
    Hassana, GK
    ADVANCES IN WEB-AGE INFORMATION MANAGEMENT, PROCEEDINGS, 2005, 3739 : 804 - 809