Enforcing Obligation with Security Monitors
نویسندگان
چکیده
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of obligation includes the following general situations: i) when the two actions involved oblige each other, and ii) when the obligatory action is causally dependent on some previous action. In addition, this type of obligation is enforceable by security monitors, thus enabling its use on a variety of different platforms. Using a security language and a compiler encompassing this type of obligation we also show how this type of obligation can be efficiently implemented by a security monitor. This is achieved with the help of the transaction concept: an action that is to be enforced in the future, because it is an obligation according to the defined policy, is part of a transaction that commits successfully only if the obligatory action has been done. To our knowledge this is the first proposal to implement a given type of obligation-based policy using a security monitor. We briefly describe the language and the system implementation and present very encouraging performance results.
منابع مشابه
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks, more and more complex human interactions are supported by computer applications. This poses new challenges on the expressiveness of security policy design systems, often requiring the use of new security paradigms. In this paper we identify a restricted type of obligation which is useful to express new security policies. This type of oblig...
متن کاملWhich security policies are enforceable by runtime monitors? A survey
Runtime monitoring is a widely used approach to ensure code safety. Several implementations of formal monitors have been proposed in the literature, and these differ with respect to the set of security policies that they are capable of enforcing. In this survey, we examine the evolution of knowledge regarding the issue of precisely which security policies monitors are capable of enforcing. We i...
متن کاملCorrective Enforcement of Security Policies
Monitoring is a powerful security policy enforcement paradigm that allows the execution of a potentially malicious software by observing and transforming it, thus ensuring its compliance with a user-defined security policy. Yet some restrictions must be imposed on the monitor’s ability to transform sequences, so that key elements of the execution’s semantics are preserved. An approximation of t...
متن کاملEnforcing Non-safety Security Policies with Program Monitors
We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target attempts to execute a potentially dangerous action. A common belief in the security community is that program monitors, regardless of the remedial steps available to them when detecting violations, can only enforce saf...
متن کاملSynthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties
Runtime enforcement is a powerful technique to ensure that a program will respect a given security policy. We extend previous works on this topic in several directions. Firstly, we propose a generic notion of enforcement monitors based on a memory device and finite sets of control states and enforcement operations. Moreover, we specify their enforcement abilities w.r.t. the general safety-progr...
متن کامل