首页> 外文会议>International Conference on Telecommunication Systems: Modeling and Analysis >An architecture for propagating modifications to mobile policies
【24h】

An architecture for propagating modifications to mobile policies

机译:用于将修改传播到移动策略的架构

获取原文
获取外文期刊封面目录资料

摘要

The use of Mobile Policies offers an alternative to conventional access control mechanism. Instead of having an operating systems maintain the rules (policies) for determining who can access an object external to the object, Mobile Policies attach the policies directly to the object. In a distributed processing environment, such as a corporate LAN or the Internet making the polices for accessing an object as mobile as the object allows for greater security and reduces overhead. Distributing the policies along with the object does introduce some problems. This paper focuses on the problem of how to update mobile policies for objects that have been released. Additionally, the question of how to enforce the policies must be addressed. It is not enough to have an object carry its access rules with it; there still needs to be an enforcement mechanism. In this paper, we introduce the concept of a network of "trusted" servers that enforce the policies. These trusted servers, called "Key Escrow Servers" enforce the mobile policy carried by the object and release decryption keys only if the requesting user is granted access to the object (As part of the process of initial securing the object, it is encrypted.) The use of the Key Escrow Server offers two distinct advantages. First, the size of the trusted portion of the network is greatly reduced to just these servers. Second, because access to the object with the Mobile Policies requires validation by a Key Escrow Server, it can be used to update the Mobile Policies any time that access to the object is requested.
机译:移动政策的使用提供了传统的访问控制机制的替代方案。而不是拥有操作系统维护规则(策略)来确定谁可以访问对象外部的对象,移动策略将策略直接连接到对象。在分布式处理环境中,例如企业LAN或Internet,使POLICE用于访问对象作为对象作为对象允许更大的安全性并减少开销。与对象一起分发策略确实会出现一些问题。本文重点介绍如何更新已发布的对象的移动策略。此外,必须解决如何强制执行策略的问题。有一个物体随身携带它的访问规则是不够的;仍然需要成为执法机制。在本文中,我们介绍了强制执行策略的“可信”服务器网络的概念。这些可信服务器,称为“键托管服务器”仅在请求用户被授予对对象的访问权限(作为初始保护对象的过程的一部分时,才强制执行由对象和释放解密密钥携带的移动策略仅加密。)主要托管服务器的使用提供了两个不同的优点。首先,网络的可信部分的大小大大减少到这些服务器。其次,因为使用移动策略访问对象需要验证键托管服务器,所以它可用于在请求访问对象的任何时间进行更新移动策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号