Distributed Enforcement of Sticky Policies with Flexible Trust

被引:6
作者
Brown, Jordan [1 ]
Blough, Douglas M. [1 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
来源
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS) | 2015年
关键词
ATTESTATION;
D O I
10.1109/HPCC-CSS-ICESS.2015.235
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we describe an approach to distributed enforcement of sticky policies in heterogeneous hardware and software environments. These heterogeneous environments might have differing mechanisms for attesting to their security capabilities and data sources might specify different levels of trust for different data items. Such an environment requires highly flexible policy specification and enforcement mechanisms. We employ sticky policies that travel with data wherever it travels, and we separate them into two components, a hosting policy and a usage policy. Hosting policies are used to ensure that data are transferred only to entities that are provably capable of providing local enforcement and only further transferring data under the same policies. Usage policies confer access, viewing, and update capabilities on users based on their attributes. The approach is supported by attribute-based certificates and policies, which include what authorities are trusted to certify attributes. In addition to presenting a full description of the approach, we report on a prototype implementation that includes all of the aforementioned components and also makes use of a modified version of Excel we developed to track security labels as data move through spreadsheets that are being shared by multiple users across different systems.
引用
收藏
页码:1202 / 1209
页数:8
相关论文
共 27 条
[1]  
Anbang R., 2011, P 6 ACM WORKSH SCAL, P3, DOI DOI 10.1145/2046582.2046586
[2]   A privacy-aware access control system [J].
Ardagna, C. ;
Cremonini, M. ;
di Vimercati, S. ;
Samarati, P. .
JOURNAL OF COMPUTER SECURITY, 2008, 16 (04) :369-397
[3]  
Bauer D., 2009, P 8 ACM WORKSH PRIV, P91
[4]  
Bauer D., 2008, P 4 ACM WORKSH DIG I, P15
[5]   End-to-end policy based encryption techniques for multi-party data management [J].
Beiter, Michael ;
Mont, Marco Casassa ;
Chen, Liqun ;
Pearson, Siani .
COMPUTER STANDARDS & INTERFACES, 2014, 36 (04) :689-703
[6]  
Bente I, 2011, LECT NOTES COMPUT SC, V6740, P108, DOI 10.1007/978-3-642-21599-5_8
[7]  
Betgé-Brezetz S, 2013, IEEE INT CONF CL NET, P25, DOI 10.1109/CloudNet.2013.6710554
[8]  
Birrell E., 2014, TECHNICAL REPORT
[9]  
Brown Jordan, 2012, AMIA Annu Symp Proc, V2012, P1148
[10]  
Cabuk S, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235