首页> 外文学位 >Trusted enforcement of contextual access control.
【24h】

Trusted enforcement of contextual access control.

机译:可信地执行上下文访问控制。

获取原文
获取原文并翻译 | 示例

摘要

As computing environments become both mobile and pervasive, the need for robust and flexible access control systems comes to the fore. Instead of relying simply on identity-based mechanisms or multi-level classifications, modern information systems must incorporate contextual factors into the access control decision. Examples of these factors include the user's location at the time of the request, the unique instance of the hardware device, and the history of previous accesses.;Designing and implementing such contextual access control mechanisms requires addressing a number of interesting challenges. First, one must be able to determine when the required policy conditions are satisfied. For instance, in the realm of spatially aware access control, the system must be able to validate user's claims to a particular location at a given time. Next, contextual mechanisms must be able to detect and react to changes in the environmental conditions, such as when a connection becomes disrupted. Finally, the integrity of the execution environment must be ensured, despite the complexity of modern computing systems.;To address these challenges, we have examined the creation of trusted enforcement mechanisms that are built on a combination of secure hardware, cryptographic protocols, virtual machine monitors, and randomized execution environments. We have developed a number of prototypes using NFC, PUFs, VMMs, and a microkernel OS to demonstrate the feasibility of our approaches to a number of contextual settings. Our experimental evaluation and security analyses demonstrate that robust mechanisms can be deployed for a minimal amount of computational expense.
机译:随着计算环境变得越来越移动和普及,对健壮和灵活的访问控制系统的需求日益迫切。现代信息系统不仅要依赖于基于身份的机制或多级分类,还必须将上下文因素纳入访问控制决策中。这些因素的示例包括在请求时用户的位置,硬件设备的唯一实例以及以前的访问历史。设计和实现这种上下文访问控制机制需要解决许多有趣的挑战。首先,必须能够确定何时满足所需的策略条件。例如,在空间感知的访问控制领域,系统必须能够在给定时间验证用户对特定位置的声明。接下来,上下文机制必须能够检测环境条件的变化并对变化做出反应,例如当连接中断时。最后,尽管现代计算系统非常复杂,但仍必须确保执行环境的完整性。为了解决这些挑战,我们研究了建立在安全硬件,加密协议,虚拟机的基础上的可信执行机制的创建。监视器和随机执行环境。我们已经开发了许多使用NFC,PUF,VMM和微内核OS的原型,以证明我们的方法可用于多种上下文设置的可行性。我们的实验评估和安全性分析表明,可以部署健壮的机制,而所需的计算费用却最少。

著录项

  • 作者

    Kirkpatrick, Michael S.;

  • 作者单位

    Purdue University.;

  • 授予单位 Purdue University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 265 p.
  • 总页数 265
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号