Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
نویسندگان
چکیده
منابع مشابه
Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous settings. More specifically, it is hard to enforce application-level policies that affect, or use information from multiple distributed components. This paper proposes the concept of a Security Service Bus (SSB), which is ...
متن کاملSpecifying and Enforcing Application-Level Web Security Policies
Application-level Web security refers to vulnerabilities inherent in the code of a Web-application itself (irrespective of the technologies in which it is implemented or the security of the Web-server/back-end database on which it is built). In the last few months, application-level vulnerabilities have been exploited with serious consequences: Hackers have tricked e-commerce sites into shippin...
متن کاملEnforcing Security Policies for Distributed Objects Applications
In this paper we present the design and the implementation of a policy engine for enforcing security policies for distributed applications. Such policies, represented by using the RBAC model, include both how the distributed, shared and replicated objects are used, by mean of role certificates and how these roles are managed by means of administrative roles. The policy engine can enforce not on...
متن کاملEnforcing management policies in distributed systems
The objective of our work is to develop a platform independent management architecture for open distributed systems. In this paper we describe one component of this architecture which enforces the observance of formally definable management policies and executes clerical management tasks automatically. Management components are defined in terms of an objectoriented class structure and policies ...
متن کاملTool Support for Enforcing Security Policies on Databases
Security in general and database protection from unauthorized access in particular, are crucial for organizations. It has long been accepted that security requirements should be considered from the early stages of the development. However, such requirements tend to be neglected or dealt-with only at the end of the development process. The Security Modeling Tool presented in this study aims at e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronic Notes in Theoretical Computer Science
سال: 2008
ISSN: 1571-0661
DOI: 10.1016/j.entcs.2007.10.012