While preventative policy enforcement mechanisms can provide theoretical guarantees that policy is correctly enforced, they have limitations in practice. They are inflexible when unanticipated circumstances arise, and...
详细信息
ISBN:
(纸本)9781595937452
While preventative policy enforcement mechanisms can provide theoretical guarantees that policy is correctly enforced, they have limitations in practice. They are inflexible when unanticipated circumstances arise, and most are either inflexible with respect to the policies they can enforce or incapable of continuing to enforce policies on data objects as they move from one system to another. In this paper we propose an approach to enforcing policies not by preventing unauthorized use, but rather by deterring it. We believe this approach is complementary to preventative policy enforcement. We call our approach APPLE for A-Posteriori PoLicy Enforcement. We introduce APPLE Core, a logical framework for using logs to verity that actions taken by the system were authorized. A trust management system is used to ensure that data objects are provided only to users operating on auditable systems who are subject to penalty should they be found in violation. This combination of audit and accountability behavior, thereby allowing a high level of assurance of end-to-end policy enforcement.
With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like accesscontrol and data pri...
详细信息
ISBN:
(纸本)9781595937452
With more and more information being exchanged or published on the Web or in peer-to-peer, and with the significant growth in numbers of distributed, heterogeneous data sources, issues like accesscontrol and data privacy are becoming increasingly complex and difficult to manage. Very often, when dealing with sensitive information in such settings, the specification of accesscontrol policies and their enforcement are no longer handled by the actual data sources, and are (partially) delegated to third-parties. Besides practical reasons, this is the case when decisions regarding access depend oil factors which overpass the scope and knowledge of sonic of the entities involved. More specifically, policies may depend on private aspects concerning users (accessing data) or data owners. In this case, the only solution is to entrust some third-party authority with all the information needed to apply access policies. However, as the policies themselves depend on sensitive information, this outsourcing raises new privacy issues. that were not present in centralized environments. In particular, information leaks may occur during accesscontrol enforcement. In this paper, we consider theses issues and, starting from non-conventional digital signatures, we take a first step towards all implementation solution for such settings where both data and access policies are distributed. Our approach involves rewriting user queries into forms which are authorized. and we illustrate this for both structured (relational) and semi-structured (XML) data and queries.
Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS). For this end, a variety of approaches and systems have been proposed and developed. However, a...
详细信息
ISBN:
(纸本)9781595937452
Protecting kernel integrity is one of the fundamental security objectives in building a trustworthy operating system (OS). For this end, a variety of approaches and systems have been proposed and developed. However, accesscontrolmodels used in most of these systems systems are not expressive enough important security requirements such as continuous policy enforcement and mutable process and object attributes. Even worse, most existing protection mechanisms in these systems reside in the same space as the running OS, which unfortunately can be disabled or subverted after an attacker successfully exploits kernel-level vulnerabilities (or features) to compromise the OS kernel. The increasing number of kernel-level rootkit attacks clearly demonstrates this threat. In this paper we present a simple but effective usage control model UCON kappa I with unique properties of decision continuity and attribute Mutability for OS kernel integrity protection. Further. to enforce UCON kappa I security policies, we propose a virtual machine monitor (VMM) based architecture that is isolated and protected front other untrusted processes inside a virtual machine (VM). We have implemented a proof-of-concept prototype in Linux to demonstrate the feasibility of our approach. Our experiments with 1.8 real-world kernel rootkits show that our approach is able to Successfully detect and prevent all kernel integrity violations from them. Beyond kernel integrity protection, we also explore additional opportunities for general OS security, such as the confinement of process activities as well as the protection of system utility programs at the VMM level.
作者:
Kolano, Paul Z.NASA
Ames Res Ctr Adv Supercomp Div Moffett Field CA 94035 USA
Grid computing promises gains in effective computational power. resource utilization, and resource accessibility, but in order to achieve these gains. organizations must deploy grid middleware that, in most cases. doe...
详细信息
ISBN:
(纸本)9781595937452
Grid computing promises gains in effective computational power. resource utilization, and resource accessibility, but in order to achieve these gains. organizations must deploy grid middleware that, in most cases. does not adhere to fundamental security principles. This paper introduces a new lightweight grid middleware called Mesh, which is based oil the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition. The initial Mesh implementation is compatible;with approximately 90% of the world's SSH servers and any SSH client that supports public key authentication. Resources may be added to a Mesh-based grid in a matter of minutes using just five small files and two environment variable settings. Mesh adheres to fundamental security principles and was designed to be compatible with strong security mechanisms including two-factor authentication, SSH bastions, and restrictive firewalls. Mesh uses a remote command model, which is based on the syntax and commands already understood by users, thus requires no additional knowledge to utilize effectively. Several existing services have been integrated with Mesh to provide resource discovery and query, high performance file transfer, and job management.
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context ...
详细信息
ISBN:
(纸本)9781595930453
Securing access to data in location- based services and mobile applications requires the definition of spatially aware access- control systems. Even if some approaches have already been proposed either in the context of geographic database systems or context- aware applications, a comprehensive framework, general and flexible enough to deal with spatial aspects in real mobile applications, is still missing. In this paper, we make one step toward this direction and present GEO- RBAC, an extension of the RBAC model enhanced with spatial- and location- based information. In GEOR-BAC, spatial entities are used to model objects, user positions, and geographically bounded roles. Roles are activated based on the position of the user. Besides a physical position, obtained from a given mobile terminal or a cellular phone, users are also assigned a logical and device- independent position, representing the feature ( the road, the town, the region) in which they are located. To enhance flexibility and reusability, we also introduce the concept of role schema, specifying the name of the role, as well as the type of the role spatial boundary and the granularity of the logical position. We then extend GEO- RBAC to support hierarchies, modeling permission, user, and activation inheritance, and separation of duty constraints. The proposed classes of constraints extend the conventional ones to deal with different granularities ( schema/ instance level) and spatial information. We conclude the paper with an analysis of several properties concerning the resulting model.
User's information confidentiality, and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, access con...
详细信息
ISBN:
(纸本)9780978569914
User's information confidentiality, and privacy rise with the increased usage of computers by various organizations. Abuse of privileges might occur when the trust is based on a single person. Moreover, accesscontrolmodels usually, consider only regular policies and are not appropriate to unusual or exceptional circumstances. For instance, in case of emergencies many users might override the accesscontrol system in order to access unauthorized sensitive data which is undesirable. In this paper we introduce a novel model named Threshold-based Collaborative accesscontrol (T-CAC). T-CAC makes it possible to specify some collaboration among various users in order to obtain permission. This relies on the intuitive idea that collaboration among users reduces the possibility of privilege abuse and presents trust as distributed over several people instead of just one person. According to users' roles, T-CAC specify weights toward permissions. Furthermore, every permission is associated to thresholds. Thresholds determine the required weight submitted by, a user to gain the requested permission. This might require collaboration with several users who belong to several roles. T-CAC allow us to better design policies that fit situations, such as emergencies and exceptions, based on possible collaborations.
Slowly but surely, industry is discovering the need for programming languages, runtime environments and methodologies adapted to collaborative and distributed computing platforms. However, current distributed platform...
详细信息
ISBN:
(纸本)9780978569914
Slowly but surely, industry is discovering the need for programming languages, runtime environments and methodologies adapted to collaborative and distributed computing platforms. However, current distributed platforms, whether industrial or academic, are generally fragile with respect to resource exhaustion, and can provide, at best, ad hoc solutions to counter accidents or Denial of Service attacks. In this paper, we examine the problem of resource management in Erlang, that is providing services for distant use, while ensuring that untrusted third-parties using the services may not cause the exhaustion of memory, file handles or other limited resources. For this, we use Targettable/Extendable pi-Calculus specification language and provide a formal semantics for a subset of Core Erlang, as well as a model of some of its library From these models, we derive a type system for formally guaranteeing robustness of services with respect to Denial of Service attacks.
暂无评论