Enforcing policies in pervasive environments

被引:0
|
作者
Patwardhan, A [1 ]
Korolev, V [1 ]
Kagal, L [1 ]
Joshi, A [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept Comp Sci & Elect Engn, Baltimore, MD 21250 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents an architecture and a proof of concept implementation of a security infrastructure for mobile devices in an infrastructure based pervasive environment. The security infrastructure primarily consists of two parts, the policy engine and the policy enforcement mechanism. Each mobile device within a pervasive environment is equipped with its own policy enforcement mechanism and is responsible for protecting its resources. A mobile device consults the nearest policy server notifies its current state including its present user network presence, other accessible devices and location information if available. Using this information the policy server queries the "Rei" engine to dynamically create a policy certificate and issues it to the requesting device. The system wide policy is described in a semantic language "Rei", a lightweight and extensible language which is able to express comprehensive policies using domain specific information. The "Rei" policy engine is able to dynamically decide what rights, prohibitions, obligations, dispensations an actor has on the domain actions. A policy certificate is created and issued to the device. The policy certificate contains a set of granted permissions and a validity period and scope within which the permissions are valid. The policy certificate can be revoked by the policy enforcer based on expiration of the validity period or a combination of timeout, loss of contact with an assigned network.
引用
收藏
页码:299 / 308
页数:10
相关论文
共 50 条
  • [31] Formalizing and Enforcing Purpose Restrictions in Privacy Policies
    Tschantz, Michael Carl
    Datta, Anupam
    Wing, Jeannette M.
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 176 - 190
  • [32] Enforcing security policies on interacting authentication systems
    Buccafurri, Francesco
    De Angelis, Vincenzo
    Lazzaro, Sara
    Pugliese, Andrea
    COMPUTERS & SECURITY, 2024, 140
  • [33] Enforcing Secure and Robust Routing with Declarative Policies
    Kodeswaran, Palanivel
    Li, Wenjia
    Joshi, Anupam
    Finin, Tim
    Perich, Filip
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 44 - 49
  • [34] Enforcing Multilevel Security Policies in Unstable Networks
    Burke, Quinn
    Mehmeti, Fidan
    George, Rahul
    Ostrowski, Kyle
    Jaeger, Trent
    La Porta, Thomas F.
    McDaniel, Patrick
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2349 - 2365
  • [35] Data sandboxing: A technique for enforcing confidentiality policies
    Khatiwala, Tejas
    Swaminathan, Raj
    Venkatakrishnan, V. N.
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 223 - +
  • [36] Enforcing UCON Policies on the Enterprise Service Bus
    Gheorghe, Gabriela
    Mori, Paolo
    Crispo, Bruno
    Martinelli, Fabio
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 876 - +
  • [37] Tool Support for Enforcing Security Policies on Databases
    Abramov, Jenny
    Anson, Omer
    Sturm, Arnon
    Shoval, Peretz
    IS OLYMPICS: INFORMATION SYSTEMS IN A DIVERSE WORLD, 2012, 107 : 126 - +
  • [38] Enforcing Security Policies Using Algebraic Approach
    Mejri, Mohamed
    Fujita, Hamido
    NEW TRENDS IN SOFTWARE METHODOLOGIES, TOOLS AND TECHNIQUES, 2008, 182 : 84 - +
  • [39] Enforcing Optimal Moving Target Defense Policies
    Zheng, Jianjun
    Namin, Akbar Siami
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 753 - 759
  • [40] Enforcing security policies for distributed objects applications
    Popescu, BC
    Crispo, B
    Tanenbaum, AS
    Zeeman, M
    SECURITY PROTOCOLS, 2005, 3364 : 119 - 133