Path-based access control for enterprise networks

被引:0
|
作者
Burnside, Matthew [1 ]
Keromytis, Angelos D. [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
来源
关键词
path-based; access control; Keynote; SOA; enterprise;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enterprise networks are ubiquitious and increasingly complex. The mechanisms for defining security policies in these networks have not kept up with the advancements in networking technology. In most cases, system administrators define policies on a per-application basis, and subsequently, these policies do riot interact. For example, there is no mechanism that allows a web server to communicate decisions based on its ruleset to a firewall in front of it, even though decisions being made at the web server may be relevant to decisions at the firewall. In this paper, we describe a path-based access control system for service-oriented architecture (SOA)-style networks which allows services to pass access-control-related information to neighboring services, as the services process requests from outsiders and from each other. Path-based access control defends networks against a class of attacks wherein individual services make correct access control decisions but the resulting global network behavior is incorrect. We demonstrate the system in two forms, using graph-based policies and by leveraging the KeyNote trust management system.
引用
收藏
页码:191 / 203
页数:13
相关论文
共 50 条
  • [11] Algorithms for path-based placement of inspection stations on networks
    Rosenkrantz, DJ
    Tayi, GK
    Ravi, SS
    INFORMS JOURNAL ON COMPUTING, 2000, 12 (02) : 136 - 149
  • [12] A restoration mechanism for virtual path-based ATM networks
    Eom, M
    Kim, C
    TWELFTH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN-12), PROCEEDINGS, 1998, : 602 - 605
  • [13] Vulnerability of complex networks under path-based attacks
    Pu, Cun-Lai
    Cui, Wei
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2015, 419 : 622 - 629
  • [14] A Reverse Hash Chain Path-Based Access Control Scheme for a Connected Smart Home System
    Kim, DaeYoub
    Lee, Jihoon
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2021, 10 (01) : 93 - 100
  • [15] Continuous Path-based Range Keyword Queries on Road Networks
    Chen, Fangshu
    Zhang, Pengfei
    Lin, Huaizhong
    Tang, Shan
    2019 10TH IEEE INTERNATIONAL CONFERENCE ON BIG KNOWLEDGE (ICBK 2019), 2019, : 42 - 49
  • [16] Digital Flight Plans for Server Access Control: Restricting anomalous activity with path-based declarations of intentions
    Loui, Ronald
    Caughey, Lucinda
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 204 - 209
  • [17] Path-Based QoS Provisioning for Optical Burst Switching Networks
    Belbekkouche, Abdeltouab
    Hafid, Abdelhakim
    Gendreau, Michel
    Tagmouti, Mariam
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2011, 29 (13) : 2048 - 2063
  • [18] Path-based multi-sources localization in multiplex networks
    Cheng, Le
    Li, Xianghua
    Han, Zhen
    Luo, Tengyun
    Ma, Lianbo
    Zhu, Peican
    CHAOS SOLITONS & FRACTALS, 2022, 159
  • [19] A path-based relation networks model for knowledge graph completion
    Lee, Wan-Kon
    Shin, Won-Chul
    Jagvaral, Batselem
    Roh, Jae-Seung
    Kim, Min-Sung
    Lee, Min-Ho
    Park, Hyun-Kyu
    Park, Young-Tack
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 182
  • [20] Resonance: Dynamic Access Control for Enterprise Networks
    Nayak, Ankur
    Reimers, Alex
    Feamster, Nick
    Clark, Russ
    WREN 2009, 2009, : 11 - 18