Consistent policy enforcement in distributed systems using mobile policies
نویسندگان
چکیده
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges facing developers of multi-tier information systems in providing effective consistent data policy enforcement, such as access control in these architectures. Finally, it introduces ‘‘Mobile Policy’’ (MoP) as a potential solution and presents a framework for using mobile policy in the business logic tier of multi-tier information systems. 2002 Elsevier Science B.V. All rights reserved.
منابع مشابه
Scalable Authorization Middleware for Service Oriented Architectures
The correct deployment and enforcement of expressive attribute-based access control (ABAC) policies in large distributed systems is a significant challenge. The enforcement of such policies requires policydependent collaborations between many distributed entities. In existing authorization systems, such collaborations are static and must be configured and verified manually by administrators. Th...
متن کاملAutonomic configuration and recovery in a mobile agent-based distributed event monitoring system
In this paper we present a framework for building policy-based autonomic distributed agent systems. The autonomic mechanisms of configuration and recovery are supported through a distributed event processing model and a set of policy enforcement mechanisms embedded in an agent framework. Policies are event-driven rules derived from the system’s functional and non-functional requirements. Agents...
متن کاملEnforcing History-Based Security Policies in Mobile Agent Systems
The mobile agent paradigm used in modern distributed systems has revealed some new forms of common security threats, such as abusive resource consumption or illegitimate information flow between different and noncooperative entities. This problem is aggravated when an agent’s host doesn’t know anything about the agent’s past activities, visited hosts and interactions with other agents. Thus, ro...
متن کاملEmbedding Policy-Controlled ID Sensors within Host Operating System Security Enforcement Components for Real Time Monitoring
This paper describes some attack and intrusion detection elements of a security architecture for distributed heterogeneous systems. The architecture concentrates on the level of the operating systems of the nodes involved and can also be retrofitted to existing COTS systems through the use of modular instrumentation extensions to the kernel and possibly the use of trusted coprocessor subsystems...
متن کاملTowards implementing policy-based systems management
Managing modern information systems becomes increasingly complex. Therefore, the need for flexible mechanisms which assist system managers is evident. Management policies are means to control object behaviour. Considerable work has been done on the specification and classification of policies, but their enforcement is still an open research topic. In this paper we propose an event-driven approa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Data Knowl. Eng.
دوره 43 شماره
صفحات -
تاریخ انتشار 2002