History-sensitive versus future-sensitive approaches to security in distributed systems

نویسندگان

  • Alejandro Mario Hernandez
  • Flemming Nielson
چکیده

We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavour of dealing with information flow rather than mere access control. We show in this paper that it is beneficial to augment this approach with history-based components as is the traditional approach in reference monitor-based approaches to mandatory access control. Our developments are performed in an aspect-oriented coordination language aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language has the capability of combining both historyand future-sensitive policies, providing even more flexibility and power.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Designing, Capturing and Validating History-Sensitive Security Policies for Distributed Systems

We consider the use of Aspect-oriented techniques as a flexible way to deal with security policies in distributed systems. We follow the approach of attaching security policies to the relevant locations that must be governed by them, and then combining them at runtime according to the interactions that happen. Recent work suggests using Aspects in this way to analyse the future behaviour of pro...

متن کامل

Proposing a Novel Cost Sensitive Imbalanced Classification Method based on Hybrid of New Fuzzy Cost Assigning Approaches, Fuzzy Clustering and Evolutionary Algorithms

In this paper, a new hybrid methodology is introduced to design a cost-sensitive fuzzy rule-based classification system. A novel cost metric is proposed based on the combination of three different concepts: Entropy, Gini index and DKM criterion. In order to calculate the effective cost of patterns, a hybrid of fuzzy c-means clustering and particle swarm optimization algorithm is utilized. This ...

متن کامل

An Intelligent Method Based on WNN for Estimating Voltage Harmonic Waveforms of Non-monitored Sensitive Loads in Distribution Network

An intelligent method based on wavelet neural network (WNN) is presented in this study to estimate voltage harmonic distortion waveforms at a non-monitored sensitive load. Voltage harmonics are considered as the main type of waveform distortion in the power quality approach. To detect and analyze voltage harmonics, it is not economical to install power quality monitors (PQMs) at all buses. The ...

متن کامل

Research into Future Control of Hepatitis B Virus and Study of Anti-HBC as the Most Sensitive Test for B Virus Carriers in Iran

Two antigen-antibody systems were Out of 42 sera from patients with acute viral hepatitis 33 were positive for HBsAg,all HBsAg positive individuals possessed anti-HBc. From 11 blood donors  sera 8 were positive for HBsAg and 9 were Positive for anti-HBc;2 leprosy sera were tested,both of them were positive for HBsAg and anti-HBc. 5 miscellaneous sam­ples,z·were positive for HBsAg and anti-HBc...

متن کامل

Introducing an algorithm for use to hide sensitive association rules through perturb technique

Due to the rapid growth of data mining technology, obtaining private data on users through this technology becomes easier. Association Rules Mining is one of the data mining techniques to extract useful patterns in the form of association rules. One of the main problems in applying this technique on databases is the disclosure of sensitive data by endangering security and privacy. Hiding the as...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010