首页> 外文学位 >Methods for specifying and resolving security policy compliance problems.
【24h】

Methods for specifying and resolving security policy compliance problems.

机译:指定和解决安全策略合规性问题的方法。

获取原文
获取原文并翻译 | 示例

摘要

Distributed systems have become sufficiently complex that it is impractical for administrators to configure them manually to prevent security vulnerabilities. These systems consist of multiple interconnected hosts that possibly run virtualized environments and support one or more distributed applications. The administrator's job is to identify security-sensitive data and configure system components (i.e., programs, operating systems, and virtualization environments) to meet a security goal (i.e., protect data from unauthorized modification or leakage).;To prevent vulnerabilities, mandatory access controls (MAC) have been integrated into applications, operating systems, and virtualized environments. MAC systems guarantee that a system behaves within the boundaries defined by an access control policy. The problem is that although MAC systems are developed to prevent vulnerabilities, configuring several of them to work as a whole is a challenging task for system administrators. Each individual MAC policy is complex, the policies are independently developed, and the security goals that prevent vulnerabilities are usually not explicit.;We develop mostly-automated services to help administrators configure and deploy distributed MAC systems to prevent security vulnerabilities. Our results show that for commonly used deployments it is possible to use available information with little input from administrators to automate tasks that are manual currently. We reduce the burden of configuration on system administrators, thus making the deployment of MAC in distributed systems more practical.
机译:分布式系统已经变得足够复杂,管理员很难手动配置它们以防止安全漏洞。这些系统由多个互连的主机组成,这些主机可能运行虚拟化环境并支持一个或多个分布式应用程序。管理员的职责是识别对安全敏感的数据并配置系统组件(即程序,操作系统和虚拟化环境)以满足安全目标(即保护数据免遭未经授权的修改或泄漏)。为了防止漏洞,必须进行强制访问控件(MAC)已集成到应用程序,操作系统和虚拟化环境中。 MAC系统可确保系统在访问控制策略定义的边界内运行。问题在于,尽管开发了MAC系统来防止漏洞,但是将其中的几个配置为整体运行对于系统管理员而言是一项艰巨的任务。每个单独的MAC策略都是复杂的,这些策略是独立开发的,并且防止漏洞的安全目标通常是不明确的。我们开发了自动化程度最高的服务,以帮助管理员配置和部署分布式MAC系统来防止安全漏洞。我们的结果表明,对于常用的部署,可以在管理员很少输入的情况下使用可用信息来自动执行当前手动的任务。我们减轻了系统管理员的配置负担,从而使MAC在分布式系统中的部署更加实用。

著录项

  • 作者单位

    The Pennsylvania State University.;

  • 授予单位 The Pennsylvania State University.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2011
  • 页码 171 p.
  • 总页数 171
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号