Security policies for distributed systems
نویسندگان
چکیده
A security policy specifies a security property as the maximal information flow. A distributed system composed of interacting processes implicitly defines an intransitive security policy by repudiating direct information flow between processes that do not exchange messages directly. We show that implicitly defined security policies in distributed systems are enforced, provided that processes run in separation, and possible process communication on a technical platform is restricted to specified message paths of the system. Furthermore, we propose to further restrict the allowable information flow by adding filter functions for controlling which messages may be transmitted between processes, and we prove that locally checking filter functions is sufficient for ensuring global security policies. Altogether, global intransitive security policies are established by means of local verification conditions for the (trusted) processes of the distributed system. Moreover, security policies may be implemented securely on distributed integration platforms which ensure partitioning. We illustrate our results with a smart grid case study, where we use CTL model checking for discharging local verification conditions for each process under consideration.
منابع مشابه
Dealing with Multi-policy Security in Large Open Distributed Systems
From the security point of view, one challenge for today's distributed architectures is to support interoperation between applications relying on di erent possibly inconsistent security policies. This paper proposes a practical solution for dealing with the coexistence of di erent security policies in distributed architectures. We introduce a model for specifying security policies in terms of s...
متن کاملManaging Security in Object-based Distributed Systems Using Ponder
Security management involves specification and deployment of access control policies as well as activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. The management actions to be performed when an event occurs depend on the enterprise policy. Reusable composite policy specifications are important to cater fo...
متن کاملA Connguration-based Environment for Dealing with Multiple Security Policies in Open Distributed Systems Position Paper
In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interop-eration between applications specifying diierent, possibly inconsistent security polic...
متن کاملA Con guration-based Environment for Dealing with Multiple Security Policies in Open Distributed Systems
In today's eld of distributed architectures there is a need for environments allowing the easy development of applications consisting of heterogeneous software modules and running on heterogeneous hardware platforms. From the security point of view, the challenge for such environments is to permit the interoperation between applications specifying di erent, possibly inconsistent security polici...
متن کاملTempering Network Stacks
This paper summarizes existing and describes ongoing work on securit ypolicy definition and particularly enforcement in heterogeneous distributed systems. Based on a formal model of operating systems and interactions among networked nodes in a distributed system axiomatizing relations among and abstractions in distributed systems, arbitrary security policies can be defined over the same model; ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1310.3723 شماره
صفحات -
تاریخ انتشار 2013