The Zodiac Policy Subsystem: a Policy-Based Management System for a High-Security MANET

被引:2
|
作者
Cheng, Yuu-Heng
Raykova, Mariana
Poylisher, Alex
Alexander, Scott
Eiger, Martin
Bellovin, Steve M.
机构
关键词
policy-based management; MANET; computer network security;
D O I
10.1109/POLICY.2009.7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Zodiac (Zero Outage Dynamic Intrinsically Assurable Communities) is an implementation of a high-security MANET, resistant to multiple types of attacks, including Byzantine faults. The Zodiac architecture poses a set of unique system security, performance, and usability requirements to its policy-based management system (PBMS). In this paper, we identify theses requirements, and present the design and implementation of the Zodiac Policy Subsystem (ZPS), which allows administrators to securely specify, distribute and evaluate network control and system security policies to customize Zodiac behaviors. ZPS uses the Keynote language for specifying all authorization policies with simple extension to support obligation policies.
引用
收藏
页码:174 / 177
页数:4
相关论文
共 50 条
  • [31] Policy-based frequency management
    Wagner, Gregory C.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1775 - 1779
  • [32] From a Database Management System to a Policy-based Network Management System
    Su, Tzong-An
    Chiu, Chen-Feng
    2011 10TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2011,
  • [33] Simulation model design of a security system based on a policy-based framework
    Seo, HS
    Cho, TH
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2003, 79 (09): : 515 - 527
  • [34] Policy transformation techniques in policy-based systems management
    Beigi, MS
    Calo, S
    Verma, D
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 13 - 22
  • [35] Distributed policy-based management enabling policy adaptation
    Yoshihara, K
    Isomura, M
    Horiuchi, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (07) : 1854 - 1865
  • [36] Policy-Based Time Slot Assignment Algorithm in a MANET(PBTSA)
    Du, Keming
    Yang, Yahui
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 93 - +
  • [37] Policy-Based Security Configuration Management Application to Intrusion Detection and Prevention
    Alsubhi, Khalid
    Aib, Issam
    Francois, Jerome
    Boutaba, Raouf
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1051 - +
  • [38] Security and differentiated hotspot services through policy-based management architecture
    Fodil, I
    Jardin, V
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 517 - 532
  • [39] Policy-based QoS architecture in the IP multimedia subsystem of UMTS
    Zhuang, W
    Gan, YS
    Loh, KJ
    Chua, KC
    IEEE NETWORK, 2003, 17 (03): : 51 - 57
  • [40] Sec-SNMP: Policy-based security management for sensor networks
    Wang, Qinghua
    Zhang, Tingting
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 222 - 226