Distributed Filtering with Contags and Security-Labels

نویسندگان

  • Matthias Kabatnik
  • Reiner Sailer
چکیده

accessed through and transmitted over these interconThis contribution presents a new access control method based on distributed filtering of data packets at network boundaries. It addresses well-known security problems that occur at network interconnection points. Our method achieves finer-grained access control than existing filtering methods by accumulating context information and distributing filter stages. We enhance conventional filter criteria—such as network address, port number, or transport protocol—by including security labels and context information. Security labels store secrecy levels, integrity levels, and categories. Context tags (contags) accumulate context information, e.g., over which incoming link a data packet was received or whether a data packet was received over protected links. This information can be examined by subsequent, possibly remote, filter stages. The authenticity of these filter criteria is crucial for the overall security. We use the history information accumulated in a data packet itself to establish trust in the included filter criteria. We focus on the structure of distributed 3-stage filters comprising receiving inspection, tagging and re-labelling, and filtering. An example shows how to use context information to improve access control for signalling networks in a heterogeneous service provider environment. This is a pre-requisite for opening service interfaces in global telecommunication networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Similarity Measure Based on Item Proximity and Closeness for Collaborative Filtering Recommendation

Recommender systems utilize information retrieval and machine learning techniques for filtering information and can predict whether a user would like an unseen item. User similarity measurement plays an important role in collaborative filtering based recommender systems. In order to improve accuracy of traditional user based collaborative filtering techniques under new user cold-start problem a...

متن کامل

History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control

This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between hosts or subnets. The proposed technique examines incoming data’s integrity properties to prevent applications within a node or subnetwork from so called subversive channels. It checks outgoing data’s secrecy requireme...

متن کامل

To Examine Dimensions of Social Networks’ Filtering Regulations in Iran’s law

Social networks play a significant role in today world. These sites affect different aspects of individual and social life of people and the national and even international levels. Accordingly, they are spreading, and will play more important role in the future life. This paper aims to examine the positive and negative effects of social networks’ filtering, that creates curiosity and has invers...

متن کامل

To Examine Dimensions of Social Networks’ Filtering Regulations in Iran’s law

Social networks play a significant role in today world. These sites affect different aspects of individual and social life of people and the national and even international levels. Accordingly, they are spreading, and will play more important role in the future life. This paper aims to examine the positive and negative effects of social networks’ filtering, that creates curiosity and has invers...

متن کامل

Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores

Secure canonical upgrade policies are multilevel relabel policies that, under certain conditions, allow high-level subjects to update low-level security labels. This paper describes a scheme whereby these policies can be supported within the Message Filter Model for multilevel secure object-oriented database management systems.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000