Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
|
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
来源
APPLIED COMPUTING 2007, VOL 1 AND 2 | 2007年
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [1] Consistent policy enforcement in distributed systems using mobile policies
    Chapin, S
    Faatz, D
    Jajodia, S
    Fayad, A
    DATA & KNOWLEDGE ENGINEERING, 2002, 43 (03) : 261 - 280
  • [2] Security Aspects: A Framework for Enforcement of Security Policies using AOP
    Ayed, Samiha
    Idrees, Muhammad Sabir
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Pinto, Monica
    Fuentes, Lidia
    2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), 2013, : 301 - 308
  • [3] An Enforcement Architecture for Security and Trust Policies in Federated Web-service-based Systems
    Wu, Zhengping
    Wang, Lifeng
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1002 - 1007
  • [4] Security Policies Enforcement Using Finite Edit Automata
    Beauquier, Daniele
    Cohen, Joelle
    Lanotte, Ruggero
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 229 (03) : 19 - 35
  • [5] SECURITY PROBLEMS IN DISTRIBUTED SYSTEMS
    Hasanova, N. A.
    Alizade, U. M.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON CONTROL AND OPTIMIZATION WITH INDUSTRIAL APPLICATIONS, VOL II, 2018, : 144 - 146
  • [6] Runtime Enforcement of Security Policies on Black Box Reactive Programs
    Ngo, Minh
    Massacci, Fabio
    Milushev, Dimiter
    Piessens, Frank
    ACM SIGPLAN NOTICES, 2015, 50 (01) : 43 - 54
  • [7] Scalable Security Enforcement for Cyber Physical Systems
    Baird, Alex
    Panda, Abhinandan
    Pearce, Hammond
    Pinisetty, Srinivas
    Roop, Partha
    IEEE ACCESS, 2024, 12 : 14385 - 14410
  • [8] SECURITY FOR DECENTRALIZED HEALTH INFORMATION-SYSTEMS
    BLEUMER, G
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1994, 35 : 139 - 145
  • [9] Decentralized access control in distributed file systems
    Miltchev, Stefan
    Smith, Jonathan M.
    Prevelakis, Vassilis
    Keromytis, Angelos
    Ioannidis, Sotiris
    ACM COMPUTING SURVEYS, 2008, 40 (03)
  • [10] Incremental Security Enforcement for Cyber-Physical Systems
    Panda, Abhinandan
    Baird, Alex
    Pinisetty, Srinivas
    Roop, Partha
    IEEE ACCESS, 2023, 11 : 18475 - 18498