Towards a Secure Application-Semantic Aware Policy Enforcement Architecture
نویسندگان
چکیده
Even though policy enforcement has been studied from different angles including notation, negotiation and enforcement, the development of an application-semantic aware enforcement architecture remains an open problem. In this paper we present and discuss the design of such an architecture.
منابع مشابه
Advanced Policy Queries
We argue that policy-aware systems can be effective only if: (i) common users—with no training in computer science or logic—become aware of the policy applied by their system; (ii) common users can personalize those policies; (iii) secure systems guide the user in getting the required permissions (cooperative enforcement). Towards this end, we introduce a mechanism for answering why, why-not, h...
متن کاملA Context-aware Architecture for Mental Model Sharing through Semantic Movement in Intelligent Agents
Recent studies in multi-agent systems are paying increasingly more attention to the paradigm of designing intelligent agents with human inspired concepts. One of the main cognitive concepts driving the core of many recent approaches in multi agent systems is shared mental models. In this paper, we propose an architecture for sharing mental models based on a new concept called semantic movement....
متن کاملSecure Semantic Computing
This paper explores the integration of semantic computing technologies with security technologies. Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and programming language-based approaches to mobile code certification and data confidentiality en...
متن کاملSecurity Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The ...
متن کاملAn Auditing System for QoS-Enabled Networks
The ongoing challenge of supporting high performance communications, real-time critical and secure applications leads to a shift from traditional IP networks towards a more intelligent, end-to-end, service-aware network paradigm. Future networks have to i) be more content or application-aware; ii) provide dynamic features for service creation; iii) observe and enforce network-wide policies; and...
متن کامل