A collaborative approach for access control, intrusion detection and security testing

被引:0
作者
Blanc, M. [1 ]
Briffautt, J. [2 ]
Clemente, P. [2 ]
El Rab, M. Gad [2 ]
Toinard, C. [2 ]
机构
[1] Commissariat Energie Atomique, BP12, F-91680 Bruyeres Le Chatel, France
[2] Lab Informat Fondamentale Orleans Batiment IIIA, F-45067 Orleans 02, France
来源
2006 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS | 2006年
关键词
security; multi-agent system; access control; intrusion detection; test; verification;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security Management is becoming a critical aspect for large scale distributed systems. In this paper, we propose a global architecture, based on an original meta-policy approach for access control and intrusion detection, allowing to guarantee global security properties. In contrast with classical meta-policy based systems, by applying verification techniques on the meta-policy, our solution guarantees global security properties while supporting local updates of the security policy. It is thus a powerful solution that provides strong fault tolerance since the control is carried out in a complete decentralized manner By using a meta-policy, the system can verify the respect of global security properties after meta or local modifications of the policy. Thanks to test components, our system is also able to evaluate and configure in real-time each of its functionalities while tracking self corruption by malicious hackers. Our architecture is a cooperative multi agent-based system, making it possible to activate a functionality independently from some others. It is divided into several levels, each one contributing to the automation of the security management.
引用
收藏
页码:270 / +
页数:2
相关论文
共 13 条
[1]  
BALASUBRAMANIYA.JJ, 1998, 9805 TR PURD U DEP C
[2]  
CARVALHO M, SAC 2004, P87
[3]  
Ferraiolo D.F., 1992, 15 NATL COMPUTER SEC, P554
[4]  
GORODETSKI V, 2002, IEEE INT C ART INT S
[5]  
GUESSOUM Z, 1999, IEEE CONCURRENCY JUL
[6]  
HOSMER HH, 1992, ACM SIGSAC REV, V10, P18
[7]  
Jansen W., 2000, 12 ANN CAN INF TECHN
[8]  
KO C, 1997, EXECUTION MONITORING
[9]  
LOSCOCCO P, 2001, FREENIX TRACK 2001 U
[10]  
MOFFETT J, 1993, IEEE JSAC SPEC I NOV