Active security support for active networks

作者: Zhaoyu Liu , R.H. Campbell , M.D. Mickunas

DOI: 10.1109/TSMCC.2003.818498

关键词:

摘要: Active networks aim to provide a software framework that enables network applications customize the processing of their communication packets. Security is critical importance success active networking. This paper presents design and description implementation for securing node an using networking principles. The secure architecture includes operating system security API, guardian, quality protection (QoP) provisions. supports highly customized situational policies created by users dynamically. It permits nodes satisfy application-specific dynamic requirements. can fundamental base infrastructure. We describe integration into demonstrate its flexible innovative features.

参考文章(39)
Spencer E. Minear, Providing policy control over object operations in a mach based system usenix security symposium. pp. 13- 13 ,(1995)
Tatyana Ryutov, Clifford Neuman, Access Control Framework for Distributed Applications ,(2000)
M. D. Mickunas, Prasad Naldurg, R. H. Campbell, Zhaoyu Liu, Seung Yi, S. K. Varadarajan, Flexible Secure Multicasting in Active Networks ICDCS Workshop on Group Communications and Computations. ,(1999)
Angelos D. Keromytis, John Ioannidis, Joan Feigenbaum, Matt Blaze, The KeyNote trust management system version2, IETF RFC 2704 ,(1999)
John F. Farrell, S. Jeff Turner, Peter A. Loscocco, Ruth C. Taylor, Stephen D. Smalley, Patrick A. Muckelbauer, The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments ,(2000)
M. D Mickunas, Roy H. Campbell, Zhaoyu Liu, Secure Information Flow in Mobile Bootstrapping Process ICDCS Workshop on Wireless Networks and Mobile Computing. ,(1999)
Dexter Kozen, Efficient Code Certification Cornell University. ,(1998)
Zhaoyu Liu, Roy H. Campbell, M. Dennis Mickunas, Securing the Node of an Active Network The Kluwer International Series in Engineering and Computer Science. pp. 127- 140 ,(2000) , 10.1007/978-1-4419-8648-1_11
Tomas Sander, Christian F. Tschudin, Protecting Mobile Agents Against Malicious Hosts Mobile Agents and Security. pp. 44- 60 ,(1998) , 10.1007/3-540-68671-1_4
M. Clavel, F. Durán, S. Eker, J. Meseguer, M. O. Stehr, Maude as a Formal Meta-tool formal methods. pp. 1684- 1703 ,(1999) , 10.1007/3-540-48118-4_39