A meta-control architecture for orchestrating policy enforcement across heterogeneous information sources
نویسندگان
چکیده
There is increasing demand from both organizations and individuals for technology capable of enforcing sophisticated, context-sensitive policies, whether security and privacy policies, corporate policies or policies reflecting various regulatory requirements. In open environments, enforcing such policies requires the ability to reason about the policies themselves as well as the ability to dynamically identify and access relevant sources of information. This article introduces a semantic web framework and a meta-control model to orchestrate policy reasoning with the identification and access of relevant sources of information. Specifically, sources of information are modeled as web services with rich semantic profiles. Policy Enforcing Agents rely on meta-control strategies to dynamically interleave semantic web reasoning and service discovery and access. Meta-control rules can be customized to best capture the requirements associated with different domains and different sets of policies. This architecture has been validated in the context of different domains, including a collaborative enterprise domain as well as several mobile and pervasive computing applications deployed on Carnegie Mellon’s campus. We show that, in the particular instance of access control policies, the proposed framework can be viewed as an extension of the XACML architecture, in which Policy Enforcing Agents offer a particularly powerful way of implementing XACML’s Policy Information Point (PIP) and Context Handler functionality. At the same time, our proposed architecture extends to a much wider range of policies and regulations. Empirical results suggest that the semantic framework introduced in this article scales favorably on problems with up to hundreds of services and tens of service directories.
منابع مشابه
nforcing ontext-Sensitive Policies in ollaborative Business nvironments
As enterprises seek to engage in increasingly rich and agile forms of collaboration, they are turning towards service-oriented architectures that enable them to selectively expose different levels of functionality to both existing and prospective business partners. This includes enforcing access control policies whose elements are tied to changing contractual relationships or to information obt...
متن کاملOrganizational Information Architecture Meta-Method for Organizational Website, Case study: Central Insurance of the Islamic Republic of Iran
Background and Aim: Information Architecture is an organizational meta-method that adopts a strategic approach to the specialized information of the organization using an integrated framework and enables the management of organizational resources by acquiring and upgrading new information technologies. Therefore, it is essential to be part of the current processes of the organization and the in...
متن کاملModel-Driven Policy Framework for Usage Control-based Privacy Position Paper
In this position paper we present a framework for the modeling and enforcement of usage control-based privacy policies. In this work we introduce only PIM (Platform Independent Model) meta-models and briefly sketch how they can be transformed into the meta-models of PSM (Platform Specific Model) and finally generate the security architecture.
متن کاملIntegrating Policy-Driven Role Based Access Control with the Common Data Security Architecture
This paper shows how Policy-Driven Role-Based Access Control (PDRBAC) techniques can be used to extend the Common Data Security Architecture (CDSA). The extensions provide constraint-based access control and are implemented using a flexible policy description language and a new trust policy enforcement mechanism. The expressiveness of the policy description language is demonstrated by examples ...
متن کاملSecurity Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Web Sem.
دوره 7 شماره
صفحات -
تاریخ انتشار 2009