Policy-based Security Management for Enterprise Systems
https://doi.org/10.1007/1-4020-8128-6_15Abstract
With the increasing growth in global enterprises and collaborations among the enterprises, security and trust have become essential for information systems. For example, within an enterprise, there may be a need to maintain security within each project group so the information sharing among the groups is controlled. Similarly, there may be a need to facilitate controlled and timed sharing of data among cooperating enterprises (e.g., coalitions). In this paper, we propose a policy-based security mechanism for such sharing in an enterprise. In particular, in our system, each user (or administrator) specifies restrictions on the use of resources at a particular node (or machine) in terms of a set of policy statements (NRPS and NTPS). Similarly, the owner of each object specifies the conditions on which certain operations can be performed on the object (ORPS and OTPS). Trusted policy enforcement agents (PEA), running at each node in the enterprise (or coalition), ensure that both node a...
References (14)
- J. Biskup and Y. Karabulut, "A hybrid PKI Model: Application to secure mediation," pp. 271-282, Research Directions in data and applications security, Kluwer Academic, 2003.
- S.Dawson, S. Qian, and P. Samarati, Secure interoperation of heterogeneous systems: A mediator-based approach. Proc. 14th IFIP TC-11 International Conference on Information Security, Chapman and Hall, 1998.
- G. Edjlali, A. Acharya, and V. Chaudhary, "History-Based Access Control for Mobile Code," Proc. ACM Conference on Computer and Communications Security, pp. 38-48, 1998.
- P. Galiasso, O. Bremer, J. Hale, S. Shenoi, D.F. Ferraiolo, and V.C. Hu, "Policy Mediation for Multi-Enterprise Environments," ACSAC 2000, pp. 100-106, 2000.
- J.A. Hoagland, R. Pandey, and K.N. Levitt, "Security policy specification using a graphical approach," Technical Report CSE-98-3, The University of California, Davis, July 1998
- V. Hu, D. Frincke, and D. Ferraiolo, "The Policy Machine for Security Policy Management," Proc. International Conference on Computational Science, pp. 494-506, 2001.
- S. Jajodia, P. Samarati, M. Sapino, V.S. Subrahmanian, "Flexible support for multiple access control policies," ACM Trans. Database Systems, Vol. 26, Issue 2, pp.214 -260, 2001. T.J. Mowbray and R. Zahavi, The Essential CORBA: Systems Integration using distributed objects, John Wiley, New York, 1995.
- N. Nagaratnam, et al., Securirty for open grid services, GWD-I, OGSA Workgroup, July 2002.
- A. Oram (Editor), Peer-to-peer: Harnessing the benefits of a disruptive technology, O'Reilly, 2001.
- M. Ripeanu, " Peer-to-Peer Architecture Case Study: Gunutella," Proc. of 2001 Conf. On Peer-to-Peer computing, Linkoping Sweden, 27-29, August 2001
- F.B. Schneider, "Enforceable security policies," ACM Press, New York, NY, USA, Volume 3, Issue 2, February 2000.
- J. Udell, N. Asthagiri, and W. Tuvell, "Security," in Peer-to-peer: Harnessing the benefits of a disruptive technology, A. Oram (Editor), pp. 354-380, O'Reilly, 2001.
- Welch, et al., "Security for grid services," Proc. Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), IEEE Press, 2003
- Yu, T., Winslett, M., and Seamons, K.E., "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM Trans. Information and System Security, Vol. 6, No. 1, pp. 1-42, Feb. 2003.