Towards a Secure Application-Semantic Aware Policy Enforcement Architecture

نویسندگان

  • Srijith Krishnan Nair
  • Bruno Crispo
  • Andrew S. Tanenbaum
چکیده

Even though policy enforcement has been studied from different angles including notation, negotiation and enforcement, the development of an application-semantic aware enforcement architecture remains an open problem. In this paper we present and discuss the design of such an architecture.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Advanced Policy Queries

We argue that policy-aware systems can be effective only if: (i) common users—with no training in computer science or logic—become aware of the policy applied by their system; (ii) common users can personalize those policies; (iii) secure systems guide the user in getting the required permissions (cooperative enforcement). Towards this end, we introduce a mechanism for answering why, why-not, h...

متن کامل

A Context-aware Architecture for Mental Model Sharing through Semantic Movement in Intelligent Agents

Recent studies in multi-agent systems are paying increasingly more attention to the paradigm of designing intelligent agents with human inspired concepts. One of the main cognitive concepts driving the core of many recent approaches in multi agent systems is shared mental models. In this paper, we propose an architecture for sharing mental models based on a new concept called semantic movement....

متن کامل

Secure Semantic Computing

This paper explores the integration of semantic computing technologies with security technologies. Past and current research on the application of semantic web technologies for policy management and inference control, the application of data mining technologies for intrusion and malware detection, and programming language-based approaches to mobile code certification and data confidentiality en...

متن کامل

Security Policy Coordination for Heterogeneous Information Systems

Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and security models before negotiating secure interoperation. This paper proposes an architecture that uses mediators and a primitive ticket-based authorization model to manage disparate policies in information enclaves. The ...

متن کامل

An Auditing System for QoS-Enabled Networks

The ongoing challenge of supporting high performance communications, real-time critical and secure applications leads to a shift from traditional IP networks towards a more intelligent, end-to-end, service-aware network paradigm. Future networks have to i) be more content or application-aware; ii) provide dynamic features for service creation; iii) observe and enforce network-wide policies; and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006