Security Policy Coordination for Heterogeneous Information Systems

نویسندگان

  • John Hale
  • Pablo Galiasso
  • Mauricio Papa
  • Sujeet Shenoi
چکیده

Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The formal foundation of the architecture facilitates static and dynamic analysis of global consistency and policy enforcement.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Model-Driven Information Flow Security for Component-Based Systems

This paper proposes a framework for information flow security in component-based systems which follows the model-driven security approach. The security policy is defined and verified from the early steps of the system design. Two kinds of non-interference properties are formally introduced and for both of them, sufficient conditions that ensures and simplifies the automated verification are pro...

متن کامل

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Multi-agent Peer-to-Peer Intrusion Detection

Ever increasing use of heterogeneous networks including mobile devices and ad-hoc sensor networks signifies the role of such information system properties as openness, autonomy, cooperation, coordination, etc. Agent-based service-oriented Peer-to-Peer (P2P) architecture provides attractive (if not single) design and implementation paradigm for such systems. This trend implies coherent evolution...

متن کامل

A Framework of Coordinated Defense

Coordinated defense in cyber warfare has emerged to protect information as assets through the use of technologies, policy, and best management practices for defending against coordinated attacks. However, combining massive security technologies, policies, procedures and security staff does not guarantee the effectiveness of defense. Without a well-defined and structured element of coordination,...

متن کامل

ISCP: design and implementation of an inter-domain security management agent (SMA) coordination protocol

This research is supported by the U.S. Department of Defense Advanced Research Projects Agency under contract DABT63-97-C-0045. Abstract Many security mechanisms and protocols have been developed to handle security problems in various circumstances. This trend has created a heterogeneous security environment for today's global Internet. Although most of security functions and modules can be man...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999