Delegation Management Modeling in a Security Policy based Environment
نویسندگان
چکیده
منابع مشابه
Delegation Management Modeling in a Security Policy based Environment
Security Policies (SP) constitute the core of communication networks protection infrastructures. It offers a set of rules allowing differentiating between legitimate actions and prohibited ones and consequently, associates each entity in the network with a set of permissions and privileges. Moreover, in today's technological society and to allow applications perpetuity, communication networks m...
متن کاملEfficient Security Policy Enforcement in a Location Based Service Environment
Location based services, one of the promising markets of mobile commerce, aims at delivering point of need personalized information. Often, these services to be delivered are based on the prior knowledge of the profiles of mobile customers and security and privacy policies dictated by them. These policies may specify revealing the sensitive information of mobile customers (e.g., age, salary) se...
متن کاملUser Isolation and Policy-Based Security Management
Network security and identity management are top concerns for service providers. Detailed traffic monitoring and analysis are typically required to identify and isolate malicious users. Such process can take hours (if not days) especially during heavy traffic loads and substantial level of attacks. As a result, the network may crash even before the analysis is completed. Thus, it may be importa...
متن کاملRole Based Trust Management Security Policy Analysis
We use symmetric keys to encrypt and decrypt attribute values. These keys are distributed only to the brokers that are trusted with the attribute values. The system will never deliver these keys to clients. This reduces the number of nodes that are trusted with sensitive keys, and that take part in key management protocols. This does not affect security since local brokers encrypt and decrypt a...
متن کاملDomain Based Internet Security Policy Management
Abstract. As security devices and protocols become widely used on the Internet, the task of managing and processing communication security policies grows steeply in its complexity. This paper presents a scaleable, robust, secure distributed system that can manage communication security policies associated with multiple network domains and resolving the policies — esp. those that specify the use...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Proceedings in Theoretical Computer Science
سال: 2013
ISSN: 2075-2180
DOI: 10.4204/eptcs.122.8