Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
来源
APPLIED COMPUTING 2007, VOL 1 AND 2 | 2007年
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 18 条
[1]   A Secure Active Network Environment architecture: Realization in SwitchWare [J].
Alexander, DS ;
Arbaugh, WA ;
Keromytis, AD ;
Smith, JM .
IEEE NETWORK, 1998, 12 (03) :37-45
[2]   RECOGNIZING SAFETY AND LIVENESS [J].
ALPERN, B ;
SCHNEIDER, FB .
DISTRIBUTED COMPUTING, 1987, 2 (03) :117-126
[3]  
BAUER L, 2005, P ACM SIGPLAN C PROG, P305
[4]  
BAUER L, 2002, FDN COMPUTER SECURIT, P95
[5]  
BREWER DDF, 1989, CHINESE WALL SECURIT
[6]  
Erlingsson U, 2000, NEW SECURITY PARADIGM WORKSHOP, PROCEEDINGS, P87
[7]  
Fong PWL, 2004, P IEEE S SECUR PRIV, P43
[8]  
Foster I., 1998, 5th ACM Conference on Computer and Communications Security, P83, DOI 10.1145/288090.288111
[9]  
FOSTER I, 2001, LECT NOTES COMPUTER, V2150, P1
[10]   Computability classes for enforcement mechanisms [J].
Hamlen, KW ;
Morrisett, G ;
Schneider, FB .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2006, 28 (01) :175-205