Decentralized Enforcement of Security Policies for Distributed Computational Systems

被引:0
|
作者
Orlovsky, Arie [1 ]
Raz, Danny [1 ]
机构
[1] Technion Israel Inst Technol, IL-3200 Technion, Haifa, Israel
来源
APPLIED COMPUTING 2007, VOL 1 AND 2 | 2007年
关键词
Security; Distributed System; Policy Enforement;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The shift from single server environments to globally distributed systems presents a great challenge in terms of defining and enforcing appropriate security policies. This is, among other things, due to the fact that the actual order between events in an asynchronous distributed environments is not always defined. In addition, security policies often depend on the actual information exchange among the distributed entities. In this paper we study the problem of adapting security policies to distributed environments such as grids and mobile code systems. We define global security policy and indicate some of the difficulties in translating local policies to the distributed environment. Then, we propose an efficient and scalable decentralized security mechanism for the enforcement of global stateful security policies in distributed computational systems. The mechanism is based on multiple instances of execution monitors (smart sandboxes) running on the distributed entities and on efficient security information sharing among them. We show that the subclasses of EM policies enforceable by this mechanism contain useful and real live security policies such as global information flow policies.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [31] Security Rating Metrics for Distributed Wireless Systems
    Buriachok, Volodymyr
    Sokolov, Volodymyr
    Skladannyi, Pavlo
    MOMLET&DS-2019: MODERN MACHINE LEARNING TECHNOLOGIES AND DATA SCIENCE, 2019, 2386 : 222 - 233
  • [32] Security agents for information retrieval in distributed systems
    Bergadano, F
    Giallombardo, A
    Puliafito, A
    Ruffo, G
    Vita, L
    1ST AUSTRIAN-HUNGARIAN WORKSHOP ON DISTRIBUTED AND PARALLEL SYSTEMS, PROCEEDINGS, 1996, 1996 (09): : 119 - 126
  • [33] Blockchain-based Mutual Authentication Security Protocol for Distributed RFID Systems
    Wang, Siye
    Zhu, Shaoyi
    Zhang, Yanfang
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 74 - 77
  • [34] Specification and verification of security requirements in a programming model for decentralized CSCW systems
    Ahmed, Tanvir
    Tripathi, Anand R.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (02)
  • [35] A SECURITY SIMULATION MODEL FOR LARGE SCALE DISTRIBUTED SYSTEMS
    Dobre, Ciprian
    Constantin, Florina
    Pop, Florin
    Cristea, Valentin
    EUROPEAN SIMULATION AND MODELLING CONFERENCE 2010, 2010, : 45 - 50
  • [36] ROLE SECURITY ACCESS CONTROLOF THE DISTRIBUTED OBJECT SYSTEMS
    He, Xu
    2014 11TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2014, : 389 - 392
  • [37] A Generic Metamodel for IT Security - Attack Modeling for Distributed Systems
    Miede, Andre
    Nedyalkov, Nedislav
    Gottron, Christian
    Koenig, Andre
    Repp, Nicolas
    Steinmetz, Ralf
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 430 - 437
  • [38] Security and Enforcement in Spectrum Sharing
    Park, Jung-Min
    Reed, Jeffrey H.
    Beex, A. A.
    Clancy, T. Charles
    Kumar, Vireshwar
    Bahrak, Behnam
    PROCEEDINGS OF THE IEEE, 2014, 102 (03) : 270 - 281
  • [39] A new security mechanism for the use in large distributed systems
    Unger, H
    PROCEEDINGS OF THE HIGH PERFORMANCE COMPUTING SYMPOSIUM - HPC '99, 1999, : 369 - 374
  • [40] Security and Data Accountability in Distributed Systems: A Provenance Survey
    Tan, Yu Shyang
    Ko, Ryan K. L.
    Holmes, Geoff
    2013 IEEE 15TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2013 IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (HPCC_EUC), 2013, : 1571 - 1578