Trust-adapted enforcement of security policies in distributed component-structured applications

被引:19
作者
Herrmann, P [1 ]
Krumm, H [1 ]
机构
[1] Univ Dortmund, Fachbereich Informat, D-44221 Dortmund, Germany
来源
PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS | 2001年
关键词
software components; wrappers; trust management; security policy enforcement; trust information service;
D O I
10.1109/ISCC.2001.935347
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Software component technology on the one hand supports the cost-effective development of specialized applications. On the other hand, however it introduces special security problems. Some major problems can be solved by the automated run-time enforcement of security policies. Each component is controlled by a wrapper which monitors the component's behavior and checks its compliance with the security behavior constraints of the component's employment contract. Since control functions and wrappers can cause substantial overhead, we introduce trust-adapted control functions where the intensity of monitoring and behavior checks depends on the level of trust, the component, its hosting environment, and its vendor have currently in the e-yes of the application administration. We report on wrappers and a trust information service, shortly outline the embedding security model and architecture, and describe a Java Bean based experimental implementation.
引用
收藏
页码:2 / 8
页数:7
相关论文
共 32 条
  • [1] [Anonymous], LNCS
  • [2] Avolio F. M., 1994, P INT SOC S NETW DIS
  • [3] Bershad B.N., 1995, P 15 ACM S OP SYST P, P267
  • [4] BISKUP J, 1994, IFIP TRANS A, V47, P3
  • [5] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [6] BLAZE M, 1999, RFC2704 IETF
  • [7] BLAZE M, 1999, INTERNET PROGRAMMING
  • [8] CHU YH, 1997, WORLD WIDE WEB J, V2, P127
  • [9] DEMUTH B, 2000, FRAMEWORK BASED APPR
  • [10] Farmer W.M., 1996, P 19 NAT INF SYST SE, V2, P591