Enforcing Private Policy via Security-by-Contract
نویسندگان
چکیده
This work aims to investigate how the Security-by-Contract (SxC) paradigm, developed for providing security assurances to mobile applications, can be used for guaranteeing the security of communicating systems composed by several, heterogeneous components. These components need to communicate with each other by establishing direct, point to point connections. Direct connections can involve components sharing no common communication protocols and need a suitable interface. Enablers are in charge of providing these communication interfaces. Each component has a local security policy composed by a public and a private part. When a communication between two components has to be established, each component asks the enabler for providing a communication interface that respects its public policy. We exploit the Security-by-Contract approach for assuring that the application implementing the communication interface is always safe, i.e., it satisfies the security policies setted by components. Moreover, we present an extension of the Security-by-Contract for dealing with trust. Trust management is useful when one of the involved actors is considered to be potentially untrusted and the others want to measure its trust level.
منابع مشابه
رویکردهای متفاوت به هزینه مبادله و دلالتهای آن برای محیط کسب و کار و اقتصاد ایران
This paper tries to indicate that new institutional economy has various origins and does not have an integrate wholeness. Lack of integraty in new institutional economy is reflected in its approach toward transaction costs there are two approaches toward transaction costs, one of which focuses on the firm and its relations and the other emphasizes on macro-infrastructures. Considering North’s a...
متن کاملInterpreting and Enforcing the Voluntary FRAND Commitment
Although often debated as though it were public law, a FRAND undertaking is a private contract between a patent-holder and an SSO. Applying ordinary principles of contract interpretation to the case of ETSI IPR policy reveals that “interpretations” of FRAND advocated by some authors—including cumulative royalty limits, royalties set by counting patents, or a prohibition on capture by the patent...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملProtecting Private Web Content from Embedded Scripts
Many web pages display personal information provided by users. The goal of this work is to protect that content from untrusted scripts that are embedded in host pages. We present a browser modification that provides fine-grained control over what parts of a document are visible to different scripts, and executes untrusted scripts in isolated environments where private information is not accessi...
متن کاملIPsec/VPN security policy correctness and assurance
With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN policies are usually specified manually by system administrators and thus prone to errors. However, dynamic aspects in the network may interfere with the existing policy set up and thus cause unexpected conflict. To deal wit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010