Enforcing policies in pervasive environments

被引:0
|
作者
Patwardhan, A [1 ]
Korolev, V [1 ]
Kagal, L [1 ]
Joshi, A [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server notifies its current state including its present user network presence, other accessible devices and location information if available. Using this information the policy server queries the "Rei" engine to dynamically create a policy certificate and issues it to the requesting device. The system wide policy is described in a semantic language "Rei", a lightweight and extensible language which is able to express comprehensive policies using domain specific information. The "Rei" policy engine is able to dynamically decide what rights, prohibitions, obligations, dispensations an actor has on the domain actions. A policy certificate is created and issued to the device. The policy certificate contains a set of granted permissions and a validity period and scope within which the permissions are valid. The policy certificate can be revoked by the policy enforcer based on expiration of the validity period or a combination of timeout, loss of contact with an assigned network.
引用
收藏
页码:299 / 308
页数:10
相关论文
共 50 条
  • [1] ESPOONERBAC: Enforcing security policies in outsourced environments
    Asghar, Muhammad Rizwan
    Ion, Mihaela
    Russello, Giovanni
    Crispo, Bruno
    COMPUTERS & SECURITY, 2013, 35 : 2 - 24
  • [2] Learning automation policies for pervasive computing environments
    Ziebart, BD
    Roth, D
    Campbell, RH
    Dey, AK
    ICAC 2005: SECOND INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2005, : 193 - 203
  • [3] Towards Enforcing On-The-Fly Policies in BYOD Environments
    Costantino, Gianpiero
    Martinelli, Fabio
    Saracino, Andrea
    Sgandurra, Daniele
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2013, : 61 - 65
  • [4] Enforcing context-sensitive policies in collaborative business environments
    Sardinha, Alberto
    Rao, Jinghai
    Sadeh, Norman
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 705 - 714
  • [5] POSTER: ESPOONERBAC : Enforcing Security Policies in Outsourced Environments with Encrypted RBAC
    Asghar, Muhammad Rizwan
    Russello, Giovanni
    Crispo, Bruno
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 841 - 843
  • [6] Evaluating Security Policies in Pervasive Mobile Environments Using Context Information
    Sanchez, Carlos
    Gruenwald, Le
    Sanchez, Mauricio
    COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 145 - +
  • [7] Supporting privacy policies in a publish-subscribe substrate for pervasive environments
    Opyrchal, Lukasz
    Prakash, Atul
    Agrawal, Amit
    Journal of Networks, 2007, 2 (01) : 17 - 26
  • [8] Enforcing Privacy as Access Control in a Pervasive Context
    Faravelon, Aurelien
    Chollet, Stephanie
    Verdier, Christine
    Front, Agnes
    2012 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2012, : 380 - 384
  • [9] Enforcing Expressive Accountability Policies
    Cherrueau, Ronan-Alexandre
    Suedholt, Mario
    2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 333 - 338
  • [10] Enforcing messaging security policies
    Likavec, J
    Wolthusen, SD
    THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 131 - 138