A Comparison of Methods for Implementing Adaptive Security Policies
نویسندگان
چکیده
The security policies for computing resources must match the security policies of the organizations that use them; therefore, computer security policies must be adaptive to meet the changing security environment of their user-base. This paper presents four methods for implementing adaptive security policies for architectures which separate the de nition of the policy in a Security Server from the enforcement which is done by the kernel. The four methods discussed include reloading a new security database for the Security Server, expanding the state and security database of the Security Server to include more than one mode of operation, implementing another Security Server and handing o control for security computations, and implementing multiple, concurrent Security Servers each controlling a subset of processes. Each of these methods comes with a set of tradeo s: policy exibility, functional exibility, security, reliability, and performance. This paper evaluates each of the implementations with respect to each of these criteria. Although the methods described in this paper were implemented for the Distributed Trusted Operating System (DTOS) prototype, this paper describes general research, and the conclusions drawn from this work need not be limited to that development platform. This work was supported by Rome Laboratory contracts F30602-95-C-0047 and F30602-96-C-0210. Portions of the DTOS Overview found in Section 4 appeared in [SKTC96].
منابع مشابه
Analysis of Intersectoral Collaboration in the Iranian Health System for Implementing Health in all Policies: Challenges and the Way Forward (This Research was Conducted Before the Covoid-19 Pandemic)
Background and Aim: For achievement of equity in the population health the implementation of health in all policies is essential. The most crucial intervention in this approach is inter-sectoral collaboration. Materials and Methods: This was a qualitative study based on the national policy framework. Data were collected using literature review, in-depth interviews and focus group discussions ...
متن کاملDesigning a Home Security System using Sensor Data Fusion with DST and DSMT Methods
Today due to the importance and necessity of implementing security systems in homes and other buildings, systems with higher certainty, lower cost and with sensor fusion methods are more attractive, as an applicable and high performance methods for the researchers. In this paper, the application of Dempster-Shafer evidential theory and also the newer, more general one Dezert-Smarandache theory ...
متن کاملمطالعه رابطه نگرش، ادراک و انگیزش کارکنان با موفقیت سیاست و برنامههای خصوصیسازی
In the late 1970s, Thatcher's government in UK launched and used the privatization of state-owned enterprises as an instrument to help modernize the unproductive UK economy. Then, growing by an economic tide in 1990s, it was known as a very important tool in the process of economic change of world's different countries from planned and governmental economy toward liberal and market economy. The...
متن کاملThe Association between Social Welfare, Food Security and Diet Diversity among Afghan Immigrant Households in the Southern Areas of Tehran Province
Background and Objectives: Due to the importance of ameliorating the food security status of immigrants, as one of the main vulnerable groups at the international level, in the present study, the association between food security, diet diversity, socio-economic factors, and social welfare of Afghan immigrant households in the Southern areas of Tehran Province was investigated. Materials & Me...
متن کاملAdaptive Policies for Reducing Inequalities in the Social Determinants of Health
Inequalities in the social determinants of health (SDH), which drive avoidable health disparities between different individuals or groups, is a major concern for a number of international organisations, including the World Health Organization (WHO). Despite this, the pathways to changing inequalities in the SDH remain elusive. The methodologies and concepts within system science are now viewed ...
متن کامل