Consistent policy enforcement in distributed systems using mobile policies

نویسندگان

  • Susan Chapin
  • Donald B. Faatz
  • Sushil Jajodia
  • Amgad Fayad
چکیده

This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges facing developers of multi-tier information systems in providing effective consistent data policy enforcement, such as access control in these architectures. Finally, it introduces ‘‘Mobile Policy’’ (MoP) as a potential solution and presents a framework for using mobile policy in the business logic tier of multi-tier information systems. 2002 Elsevier Science B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Scalable Authorization Middleware for Service Oriented Architectures

The correct deployment and enforcement of expressive attribute-based access control (ABAC) policies in large distributed systems is a significant challenge. The enforcement of such policies requires policydependent collaborations between many distributed entities. In existing authorization systems, such collaborations are static and must be configured and verified manually by administrators. Th...

متن کامل

Autonomic configuration and recovery in a mobile agent-based distributed event monitoring system

In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mechanisms embedded in an agent framework. Policies are event-driven rules derived from the system’s functional and non-functional requirements. Agents...

متن کامل

Enforcing History-Based Security Policies in Mobile Agent Systems

The mobile agent paradigm used in modern distributed systems has revealed some new forms of common security threats, such as abusive resource consumption or illegitimate information flow between different and noncooperative entities. This problem is aggravated when an agent’s host doesn’t know anything about the agent’s past activities, visited hosts and interactions with other agents. Thus, ro...

متن کامل

Embedding Policy-Controlled ID Sensors within Host Operating System Security Enforcement Components for Real Time Monitoring

This paper describes some attack and intrusion detection elements of a security architecture for distributed heterogeneous systems. The architecture concentrates on the level of the operating systems of the nodes involved and can also be retrofitted to existing COTS systems through the use of modular instrumentation extensions to the kernel and possibly the use of trusted coprocessor subsystems...

متن کامل

Towards implementing policy-based systems management

Managing modern information systems becomes increasingly complex. Therefore, the need for flexible mechanisms which assist system managers is evident. Management policies are means to control object behaviour. Considerable work has been done on the specification and classification of policies, but their enforcement is still an open research topic. In this paper we propose an event-driven approa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Data Knowl. Eng.

دوره 43  شماره 

صفحات  -

تاریخ انتشار 2002