Developing Dynamic Security Policies
نویسندگان
چکیده
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by changing the operational parameters of shared system objects. These policies do not account for the behavior of the entire system, and enforcing these policies can have unexpected interactive or concurrent behavior. We present a policy specification, implementation, and enforcement methodology based on formal models of interactive behavior and satisfiability of system properties. We show that changing the operational parameters of our policy implementation entities does not affect the behavioral guarantees specified by the properties. We demonstrate the construction of dynamic access control policies based on safety property specifications and describe an implementation of these policies in the Seraphim active network architecture. We present examples of reactive security systems that demonstrate the power and dynamism of our policy implementations. We also describe other types of dynamic policies for information flow and availability based on safety, liveness, fairness, and other properties. We believe that dynamic policies are important building blocks of reactive security solutions for active networks.
منابع مشابه
Dynamic Access Control Policies and Web-Service Composition
Service composition is a fundamental technique for developing web-service applications. In general, a single service is not enough to achieve the user’s goal, rather several services, often from different providers, are composed dynamically to satisfy a request. Ensuring security in such a system is challenging and not supported by most of the security frameworks proposed in current literature....
متن کاملSecuring Web Service Compositions: Formalizing Authorization Policies Using Event Calculus
Service composition is a fundamental technique for developing Web services based applications. As autonomous services are invoked through protocols, issues such as security must be taken into account. Thus, ensuring security in such a system is challenging and not supported by most of the security frameworks proposed in current literature. This paper presents a formal model for composing securi...
متن کاملDynamic Reconfiguration of Security Policies in Wireless Sensor Networks
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications for these systems run in a myriad of sensors with different low-level programming abstractions, limited capabilities and different routing protocols. This means that applicati...
متن کاملA Framework and Language Support for Dynamic Security Policy in Service-Oriented Architecture
In today’s global network-based environment, where mission-critical applications typically run on highly distributed systems, customers expect reliable, available, and secure services. Supporting security becomes an important issue in service-oriented architecture (SOA). This paper describes how to simultaneously support both dynamic security policies and separation of concerns when developing ...
متن کاملThe Effect of Business Cycle Fluctuations on Import Protection in Selected Developing Countries
In recent decades, theorists proposed the role of domestic components such as interior active groups, policies and macroeconomic indicators on determination of protection policies. In the context of recent studies, this study has investigated the effect of business cycle fluctuations on import protection for selected developing countries in 1995-2011 by using dynamic panel data method. Furtherm...
متن کامل