...
首页> 外文期刊>The Journal of Systems and Software >Dynamic deployment of context-aware access control policies for constrained security devices
【24h】

Dynamic deployment of context-aware access control policies for constrained security devices

机译:为受约束的安全设备动态部署上下文感知的访问控制策略

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Securing the access to a server, guaranteeing a certain level of protection over an encrypted communication channel, executing particular counter measures when attacks are detected are examples of security requirements. Such requirements are identified based on organizational purposes and expectations in terms of resource access and availability and also on system vulnerabilities and threats. All these requirements belong to the so-called security policy. Deploying the policy means enforcing, i.e., configuring, those security components and mechanisms so that the system behavior be finally the one specified by the policy. The deployment issue becomes more difficult as the growing organizational requirements and expectations generally leave behind the integration of new security functionalities in the information system: the information system will not always embed the necessary security functionalities for the proper deployment of contextual security requirements. To overcome this issue, our solution is based on a central entity approach which takes in charge unmanaged contextual requirements and dynamically redeploys the policy when context changes are detected by this central entity. We also present an improvement over the OrBAC (Organization-Based Access Control) model. Up to now, a controller based on a contextual OrBAC policy is passive, in the sense that it assumes policy evaluation triggered by access requests. Therefore, it does not allow reasoning about policy state evolution when actions occur. The modifications introduced by our work overcome this limitation and provide a proactive version of the model by integrating concepts from action specification languages.
机译:安全要求包括保护对服务器的访问,在加密的通信通道上保证一定程度的保护,在检测到攻击时执行特定的对策。此类要求是根据组织目的和对资源访问和可用性的期望以及系统漏洞和威胁来确定的。所有这些要求都属于所谓的安全策略。部署该策略意味着强制执行(即配置)那些安全组件和机制,以使系统行为最终成为该策略指定的行为。随着组织需求和期望的增长通常会导致在信息系统中集成新的安全功能,部署问题变得更加困难:信息系统将不会始终嵌入必要的安全功能,以正确部署上下文安全要求。为了解决此问题,我们的解决方案基于中央实体方法,该方法负责管理非托管的上下文需求,并在此中央实体检测到上下文更改时动态重新部署策略。我们还提出了对OrBAC(基于组织的访问控制)模型的改进。到目前为止,基于上下文OrBAC策略的控制器是被动的,因为它假定策略评估是由访问请求触发的。因此,它不允许在操作发生时就策略状态演变进行推理。我们的工作引入的修改克服了这一限制,并通过整合动作规范语言中的概念提供了该模型的主动版本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号