A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment

作者: A. Hess , G. Schäfer

DOI: 10.1007/978-3-642-55569-5_26

关键词:

摘要: To provide security for active networking nodes with respect to availability and controlled access the introduction of an control mechanism consequently a policy framework are mandatory. We follow approach scenario-tailored runtime supervision service. During development we strongly focused on keeping as efficient possible realize modular design which allows dynamically upgrade configure making use technology itself while at same time ensuring that mandatory checks cannot be circumvented. Each service has pass initial before it could executed node. Furthermore, also service-specific adaptive criterions included into check. This paper discusses corresponding flexible dynamic present results achieved first prototype realized environment AMnet.

参考文章(17)
Till Harbaum, Anke Speer, Ralph Wittmann, Martina Zitterbart, Amnet: Efficient Heterogeneous Group Communication Through Rapid Service Creation The Kluwer International Series in Engineering and Computer Science. pp. 31- 40 ,(2000) , 10.1007/978-1-4419-8648-1_3
Zhaoyu Liu, Roy H. Campbell, M. Dennis Mickunas, Securing the Node of an Active Network The Kluwer International Series in Engineering and Computer Science. pp. 127- 140 ,(2000) , 10.1007/978-1-4419-8648-1_11
Michael A. Arbib, A. J. Kfoury, Robert N. Moll, A Programming Approach to Computability ,(1982)
Karen R. Sollins, Nimisha V. Mehta, Expanding and extending the security features of java usenix security symposium. pp. 12- 12 ,(1998)
Martina Zitterbart, A. Wolisz, Marcus Schöller, Adam Hess, G. Schäfer, A dynamic and flexible Access Control and Resource Monitoring Mechanism for Active Nodes The Fifth IEEE Conference on Open Architectures and Network Programming (OpenArch 2002), New York, NY, June 28-29, 2002. ,(2002)
J.J. Hartman, P.A. Bigot, P. Bridges, B. Montz, R. Piltz, O. Spatscheck, T.A. Proebsting, L.L. Peterson, A. Bavier, Joust: a platform for liquid software Computer. ,vol. 32, pp. 50- 56 ,(1999) , 10.1109/2.755005
Li Gong, Java security: present and near future IEEE Micro. ,vol. 17, pp. 14- 19 ,(1997) , 10.1109/40.591650
Fred B. Schneider, Enforceable security policies ACM Transactions on Information and System Security. ,vol. 3, pp. 30- 50 ,(2000) , 10.1145/353323.353382
Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten, Extensible security architectures for Java symposium on operating systems principles. ,vol. 31, pp. 116- 128 ,(1997) , 10.1145/268998.266668
J.H. Saltzer, M.D. Schroeder, The protection of information in computer systems Proceedings of the IEEE. ,vol. 63, pp. 1278- 1308 ,(1975) , 10.1109/PROC.1975.9939