The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET

被引:2
|
作者
Cheng, Yuu-Heng
Raykova, Mariana
Poylisher, Alex
Alexander, Scott
Eiger, Martin
Bellovin, Steve M.
机构
关键词
policy-based management; MANET; computer network security;
D O I
10.1109/POLICY.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzantine faults. The Zodiac architecture poses a set of unique system security, performance, and usability requirements to its policy-based management system (PBMS). In this paper, we identify theses requirements, and present the design and implementation of the Zodiac Policy Subsystem (ZPS), which allows administrators to securely specify, distribute and evaluate network control and system security policies to customize Zodiac behaviors. ZPS uses the Keynote language for specifying all authorization policies with simple extension to support obligation policies.
引用
收藏
页码:174 / 177
页数:4
相关论文
共 50 条
  • [21] Policy-based distributed network management system
    Li, Li
    Ren, Xiu-Li
    Luan, Gui-Xing
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2002, 23 (06): : 515 - 518
  • [22] A policy-based hierarchical network management system
    Ping, W
    Hong, Z
    Li, L
    DCABES 2001 PROCEEDINGS, 2001, : 176 - 179
  • [23] Policy-based proactive monitoring of security policy performance
    Bogdanov, Vitaly
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 197 - +
  • [24] Security and resource policy-based management architecture for ALAN servers
    Olukemi, T
    Liabotis, I
    Prnjat, O
    Sacks, L
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 91 - 102
  • [25] Policy-based security management for ad hoc wireless systems
    Zheng, Harold
    Wang, Sherry
    Nichols, Robert A.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2531 - 2537
  • [26] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [27] Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy
    George, Laurent
    Tong, Valerie Viet Triem
    Me, Ludovic
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 355 - 356
  • [28] Policy-based IPsec management
    Li, M
    IEEE NETWORK, 2003, 17 (06): : 36 - 43
  • [29] Policy-based network management
    Choudhary, AR
    BELL LABS TECHNICAL JOURNAL, 2004, 9 (01) : 19 - 29
  • [30] Policy-based network management
    Wang, CK
    2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 101 - 105