Security Policy Coordination for Heterogeneous Information Systems
نویسندگان
چکیده
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The formal foundation of the architecture facilitates static and dynamic analysis of global consistency and policy enforcement.
منابع مشابه
Model-Driven Information Flow Security for Component-Based Systems
This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach. The security policy is defined and verified from the early steps of the system design. Two kinds of non-interference properties are formally introduced and for both of them, sufficient conditions that ensures and simplifies the automated verification are pro...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملMulti-agent Peer-to-Peer Intrusion Detection
Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information system properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not single) design and implementation paradigm for such systems. This trend implies coherent evolution...
متن کاملA Framework of Coordinated Defense
Coordinated defense in cyber warfare has emerged to protect information as assets through the use of technologies, policy, and best management practices for defending against coordinated attacks. However, combining massive security technologies, policies, procedures and security staff does not guarantee the effectiveness of defense. Without a well-defined and structured element of coordination,...
متن کاملISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol
This research is supported by the U.S. Department of Defense Advanced Research Projects Agency under contract DABT63-97-C-0045. Abstract Many security mechanisms and protocols have been developed to handle security problems in various circumstances. This trend has created a heterogeneous security environment for today's global Internet. Although most of security functions and modules can be man...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999