A Service Dependency Modeling Framework for Policy-Based Response Enforcement

被引:0
作者
Kheir, Nizar [1 ,2 ]
Debar, Herve [1 ]
Cuppens, Frederic [2 ]
Cuppens-Boulahia, Nora [2 ]
Viinikka, Jouni [1 ]
机构
[1] France Telecom, R&D Caen, 42 Rue Coutures BP 6243, F-14066 Caen, France
[2] Telecom Bretagne, Plouzane, France
来源
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS | 2009年 / 5587卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tightened during system design-time, and the large number of service dependencies in a system architecture makes their dynamic adaptation difficult. The enforcement of a single response rule requires performing multiple configuration changes on multiple services. This paper formally describes a Service Dependency Framework (SDF) in order to assist the response process in selecting the policy enforcement points (PEPs) capable of applying a dynamic response rule. It automatically derives elementary access rules from the generic access control, either allowed or denied by the dynamic response policy, so they can be locally managed by local PEPs. SDF introduces a requires/provides model of service dependencies. It models the service architecture in a modular way, and thus provides both extensibility and reusability of model components. SDF is defined using the Architecture Analysis and Design Language, which provides formal concepts for modeling system architect tires. This paper presents a systematic treatment of the dependency model which aims to apply policy rules while minimizing configuration changes and reducing resource consumption.
引用
收藏
页码:176 / +
页数:4
相关论文
共 21 条
  • [11] *INT SOC AUT ENG, 2004, SAEAS5506 INT SOC AU
  • [12] JAHNKE M, 2007, IEEE C LOC COMP NETW
  • [13] KALAM AAE, 2003, IEEE INT WKSHP POL D
  • [14] KELLER A, 2000, P INT C PAR DISTR PR
  • [15] PAPADAKI M, 2005, 10 INF SEC
  • [16] PREDA S, 2007, INT C SEC CRYPT
  • [17] RANDIC M, 2005, P INT C EUROCON
  • [18] Rugina AE, 2007, LECT NOTES COMPUT SC, V4615, P14
  • [19] Role based access control models
    Sandhu, RS
    Coyne, EJ
    Feinstein, HL
    Youman, CE
    [J]. COMPUTER, 1996, 29 (02) : 38 - &
  • [20] STAKHANOVA N, 2007, INT J INFORM COMPUTE, V1