Security Engineering for Roles and Resources in a Distributed Environment

نویسنده

  • Steven A. Demurjian
چکیده

One critical challenge to security for distributed applications (which consist of legacy, COTS, databases, clients, etc.) is managing access to available resources (and their APIs). An engineered solution is critical to insure that clients are restricted to select portions of resource APIs at different times and under specific conditions. This work offers a constraint-based role security model and enforcement framework for authentication, authorization, enforcement, and policy realization of distributed applications. Our approach utilizes middleware (e.g. CORBA and /or JINI), to federate users and their resources (e.g., APIs of Legacy, COTS, and databases) into a securely engineered solution that attains fine-grained security via permissions placed against resource APIs (methods) constrained by time and data values as defined for individual user roles. This allows the realization of a flexible security policy and provides the users with assurance. In this paper, we present a formal constraint-based role security model and corresponding enforcement framework (with prototype) that can serve as a strong basis for the security engineering of applications such as the Dynamic Coalition Problem.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimization of the Microgrid Scheduling with Considering Contingencies in an Uncertainty Environment

In this paper, a stochastic two-stage model is offered for optimization of the day-ahead scheduling of the microgrid. System uncertainties including dispatchable distributed generation and energy storage contingencies are considered in the stochastic model. For handling uncertainties, Monte Carlo simulation is employed for generation several scenarios and then a reduction method is used to decr...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Optimization Task Scheduling Algorithm in Cloud Computing

Since software systems play an important role in applications more than ever, the security has become one of the most important indicators of softwares.Cloud computing refers to services that run in a distributed network and are accessible through common internet protocols. Presenting a proper scheduling method can lead to efficiency of resources by decreasing response time and costs. This rese...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002