Security Engineering for Roles and Resources in a Distributed Environment
نویسنده
چکیده
One critical challenge to security for distributed applications (which consist of legacy, COTS, databases, clients, etc.) is managing access to available resources (and their APIs). An engineered solution is critical to insure that clients are restricted to select portions of resource APIs at different times and under specific conditions. This work offers a constraint-based role security model and enforcement framework for authentication, authorization, enforcement, and policy realization of distributed applications. Our approach utilizes middleware (e.g. CORBA and /or JINI), to federate users and their resources (e.g., APIs of Legacy, COTS, and databases) into a securely engineered solution that attains fine-grained security via permissions placed against resource APIs (methods) constrained by time and data values as defined for individual user roles. This allows the realization of a flexible security policy and provides the users with assurance. In this paper, we present a formal constraint-based role security model and corresponding enforcement framework (with prototype) that can serve as a strong basis for the security engineering of applications such as the Dynamic Coalition Problem.
منابع مشابه
Optimization of the Microgrid Scheduling with Considering Contingencies in an Uncertainty Environment
In this paper, a stochastic two-stage model is offered for optimization of the day-ahead scheduling of the microgrid. System uncertainties including dispatchable distributed generation and energy storage contingencies are considered in the stochastic model. For handling uncertainties, Monte Carlo simulation is employed for generation several scenarios and then a reduction method is used to decr...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملOptimization Task Scheduling Algorithm in Cloud Computing
Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. This rese...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002