Secure interoperation with O2O contracts
نویسندگان
چکیده
The evolution of today’s markets and the high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining security objectives satisfiability. This is all the more true in case of collaboration and interoperability between different organizations and thus between their information systems. Usual solutions do not anticipate interoperability security requirements or do it in a non satisfactory way. In this paper, we propose contract and compatibility principles to achieve a secure interoperation. Contracts () are used to explicitly represent the rules that determine the way interaction between organizations must be controlled to satisfy secure accesses to resources. Compatibility relations make it possible to derive interoperability security policies. a The term contract has a semantics close to Lindenberg’s framing theory, see for instance [Lin92]
منابع مشابه
O2O: Virtual Private Organizations to Manage Security Policy Interoperability
Nowadays, the interaction between systems is absolutely essential to achieve business continuity. There is a need to exchange and share services and resources. Unfortunately, this does not come without security problems. The organizations (companies, enterprizes, etc.) have to manage accesses to their services and resources by external opponents. O2O is a formal approach we suggest in this pape...
متن کاملComputational Issues in Secure
| Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interoperation of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures, while for a g...
متن کاملThe complexity and composability of secure interoperation
Advances in distributed systems and networking technology have made interoperation not only feasible but also increasingly popular. We deene the interop-eration of secure systems and its security, and prove complexity and composability results on obtaining optimal and secure interoperation. Most problems are NP-complete even for systems with very simple access control structures. Nevertheless, ...
متن کاملA Requirements-Driven Trust Framework for Secure Interoperation in Open Environments
A key challenge in emerging multi-domain open environments is the need to establish trust-based, loosely coupled partnerships between previously unknown domains. An efficient trust framework is essential to facilitate trust negotiation based on the service requirements of the partner domains. While several trust mechanisms have been proposed, none address the issue of integrating the trust mech...
متن کاملO2O: Managing Security Policy Interoperability with Virtual Private Organizations
Nowadays, the interaction between systems is absolutely essential to achieve business continuity due to the need of exchanging and sharing services and resources. Unfortunately, this does not come without security problems. The organizations (companies, enterprizes, etc.) have to manage accesses to their services and resources by external opponents. O2O is a formal approach we suggest in this p...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008