Secure interoperation with O2O contracts

نویسندگان

  • Céline Coma
  • Ana Rosa Cavalli
  • A. R. Cavalli
چکیده

The evolution of today’s markets and the high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining security objectives satisfiability. This is all the more true in case of collaboration and interoperability between different organizations and thus between their information systems. Usual solutions do not anticipate interoperability security requirements or do it in a non satisfactory way. In this paper, we propose contract and compatibility principles to achieve a secure interoperation. Contracts () are used to explicitly represent the rules that determine the way interaction between organizations must be controlled to satisfy secure accesses to resources. Compatibility relations make it possible to derive interoperability security policies. a The term contract has a semantics close to Lindenberg’s framing theory, see for instance [Lin92]

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

O2O: Virtual Private Organizations to Manage Security Policy Interoperability

Nowadays, the interaction between systems is absolutely essential to achieve business continuity. There is a need to exchange and share services and resources. Unfortunately, this does not come without security problems. The organizations (companies, enterprizes, etc.) have to manage accesses to their services and resources by external opponents. O2O is a formal approach we suggest in this pape...

متن کامل

Computational Issues in Secure

| Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interoperation of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures, while for a g...

متن کامل

The complexity and composability of secure interoperation

Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interop-eration of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures. Nevertheless, ...

متن کامل

A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments

A key challenge in emerging multi-domain open environments is the need to establish trust-based, loosely coupled partnerships between previously unknown domains. An efficient trust framework is essential to facilitate trust negotiation based on the service requirements of the partner domains. While several trust mechanisms have been proposed, none address the issue of integrating the trust mech...

متن کامل

O2O: Managing Security Policy Interoperability with Virtual Private Organizations

Nowadays, the interaction between systems is absolutely essential to achieve business continuity due to the need of exchanging and sharing services and resources. Unfortunately, this does not come without security problems. The organizations (companies, enterprizes, etc.) have to manage accesses to their services and resources by external opponents. O2O is a formal approach we suggest in this p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008