The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET

被引:2
|
作者
Cheng, Yuu-Heng
Raykova, Mariana
Poylisher, Alex
Alexander, Scott
Eiger, Martin
Bellovin, Steve M.
机构
关键词
policy-based management; MANET; computer network security;
D O I
10.1109/POLICY.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzantine faults. The Zodiac architecture poses a set of unique system security, performance, and usability requirements to its policy-based management system (PBMS). In this paper, we identify theses requirements, and present the design and implementation of the Zodiac Policy Subsystem (ZPS), which allows administrators to securely specify, distribute and evaluate network control and system security policies to customize Zodiac behaviors. ZPS uses the Keynote language for specifying all authorization policies with simple extension to support obligation policies.
引用
收藏
页码:174 / 177
页数:4
相关论文
共 50 条
  • [11] A policy-based network management system
    Bhatia, R
    Kohli, M
    Lobo, J
    Virmani, A
    INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL I AND II, 1999, : 465 - 471
  • [12] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [13] Declarative Policy-based Adaptive MANET Routing
    Liu, Changbin
    Correa, Ricardo
    Li, Xiaozhou
    Basu, Prithwish
    Loo, Boon Thau
    Mao, Yun
    2009 17TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2009), 2009, : 354 - +
  • [14] A policy-based approach to Wireless LAN security management
    Lapiotis, George
    Kim, Byungsuk
    Das, Subir
    Anjum, Farooq
    2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 174 - 182
  • [15] Designing of policy-based negotiation protocol on MANET
    Pornavalai, Chotipat
    Srifa, Nualpam
    Varakulsiripuntht, Ruttikorn
    2006 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES,VOLS 1-3, 2006, : 343 - +
  • [16] Design of policy-based security management for intrusion detection
    Jo, SH
    Kim, JN
    Soh, SW
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 337 - 340
  • [17] Design of network security policy information model for policy-based network management
    Sohn, SG
    Kim, J
    Na, JC
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 701 - 705
  • [18] Analysis of Policy-Based Security Management System in Software-Defined Networks
    Sood, Keshav
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Uday
    Yu, Shui
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (04) : 612 - 615
  • [19] Policy-Based Security Management System for 5G Heterogeneous Networks
    Alquhayz, Hani
    Alalwan, Nasser
    Alzahrani, Ahmed Ibrahim
    Al-Bayatti, Ali H.
    Sharif, Mhd Saeed
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2019, 2019
  • [20] A policy-based network management system for IPVPN
    Guo, X
    Yang, K
    Galis, A
    Cheng, XC
    Yang, B
    Liu, DY
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1630 - 1633