Towards a reference architecture for service-oriented cross domain security infrastructures

被引:0
作者
Zhu, Wen [1 ]
Vizenor, Lowell [2 ]
Srinivasan, Avinash [3 ]
机构
[1] Alion Science and Technology, Vienna, VA
[2] National Center for Ontological Research, Reston, VA
[3] George Mason University, Fairfax, VA
来源
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014年 / 8729卷
关键词
Cross Domain Communications; Ontology; Protocol; Reference Architecture; Security Guard; Service Oriented Architecture; Workflow;
D O I
10.1007/978-3-319-11692-1_24
中图分类号
学科分类号
摘要
Today’s Cross Domain Communication (CDC) infrastructure largely consists of guards built to vendor specifications. Such an infrastructure often fails to provide adequate protections for CDC workflows involving Service Oriented Architectures. Focusing on the transport layer and oblivious to the context of the information exchanges, the guards often rely on rudimentary filtering techniques that require frequent human intervention to adjudicate messages. In this paper, we present a set of key requirements and design principles for a Service Oriented Cross Domain Security Infrastructure in form of a CDC Reference Architecture, featuring domain-associated guards as active workflow participants. This reference architecture will provide the foundation for the development of protocols and ontologies enabling runtime coordination among CDC elements, leading to more secure, effective, and interoperable CDC solutions. © Springer International Publishing Switzerland 2014.
引用
收藏
页码:275 / 284
页数:9
相关论文
共 21 条
[1]  
Swamy N., Hicks M., Verified Enforcement of Security Policies for Cross-Domain
[2]  
Irvine C.E., Et al., MYSEA: The Monterey security architecture, Proc. Of the Workshop on Scalable Trusted Computing (ACM STC), Conference on Computer and Communications Security (CCS), pp. 39-48, (2009)
[3]  
Atighetchi M., Et al., XDDS: A Salable Guard-Agnostic Cross Domain Discovery Service
[4]  
Web Services Architecture
[5]  
Shader M., Cross-Domain Application Architecture: The Need for an End-to-End Approach, (2012)
[6]  
Fielding R., Architectural styles and the design of network-based software architectures, (2000)
[7]  
IC/DoD Content Discovery and Retrieval Reference Architecture, (2011)
[8]  
Universal Description, Discovery and Integration, (2005)
[9]  
Kim A., Luo J., Kang M., Security ontology for annotating resources, OTM 2005. LNCS, 3761, pp. 1483-1499., (2005)
[10]  
Denker G., Kagal L., Finin T., Security in the Semantic Web using OWL, Information Security Technical Report, 10, 1, pp. 51-58, (2005)