Filters








4,150 Hits in 3.6 sec

Distributed Middleware Enforcement of Event Flow Security Policy [chapter]

Matteo Migliavacca, Ioannis Papagiannis, David M. Eyers, Brian Shand, Jean Bacon, Peter Pietzuch
2010 Lecture Notes in Computer Science  
We describe DEFCon-Policy, a middleware that enforces security policy in multi-domain, event-driven applications.  ...  Current middleware does not support the specification of such end-to-end security policy and lacks uniform mechanisms for enforcement.  ...  Acknowledgements This work was supported by grants EP/F042469 and EP/F044216 ("SmartFlow: Extendable Event-Based Middleware") from the UK Engineering and Physical Sciences Research Council (EPSRC).  ... 
doi:10.1007/978-3-642-16955-7_17 fatcat:eud55oh7h5gohksqe4g4witkce

Integrating Messaging Middleware and Information Flow Control

Jatinder Singh, Thomas F. J.-M. Pasquier, Jean Bacon, David Eyers
2015 2015 IEEE International Conference on Cloud Engineering  
We detail how such middleware can integrate with local (kernel) enforcement mechanisms, and highlight the benefits of separating data management policy from application/service-logic.  ...  This paper makes the case for, and demonstrates the feasibility of an IFC-enabled messaging middleware, to enforce IFC within and across applications, containers, VMs, and hosts.  ...  Further, a distributed IFC-middleware must enforce labels consistent with those of the local machine.  ... 
doi:10.1109/ic2e.2015.13 dblp:conf/ic2e/SinghPBE15 fatcat:cnigp56jxff2he2o6rmbpdxmue

Towards application driven security dashboards in future middleware

Wouter Joosen, Bert Lagaisse, Eddy Truyen, Koen Handekyn
2011 Journal of Internet Services and Applications  
In addition, we sketch why such an approach cannot only yield the desired variants of middleware security services, but also application-driven security dashboards, i.e. the tools to monitor and manage  ...  We illustrate the concept and approach with an example in the domain of security engineering of a large scale, internet based application in the domain of online document processing.  ...  Acknowledgements This work was partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy, IBBT, the EU-FP7 NoE NESSoS, and by the Research Fund K.U.  ... 
doi:10.1007/s13174-011-0047-6 fatcat:avrzekd7jrexpdpc5l56rcjiqa

Infrastructural Support for Enforcing and Managing Distributed Application-Level Policies

Tom Goovaerts, Bart De Win, Wouter Joosen
2008 Electronical Notes in Theoretical Computer Science  
State-of-the-art security mechanisms are often enforced in isolation from each other, which limits the kinds of policies that can be enforced in distributed and heterogeneous settings.  ...  The SSB treats the security mechanisms as reusable, stand-alone security services that can be bound to the applications and it allows the enforcement of advanced policies by providing uniform access to  ...  The third policy illustrates that security policies might affect several distributed components: the detection of an event at the web container triggers a change in the policies of different security mechanisms  ... 
doi:10.1016/j.entcs.2007.10.012 fatcat:leotosc55fh7jeysu35zu3ajrm

Integrating security policies via Container Portable Interceptors

Tom Ritter, Rudolf Schreiner, Ulrich Lang
2005 Proceedings of the 4th workshop on Reflective and adaptive middleware systems - ARM '05  
Integrating CORBA component-based and model-driven middleware and a policy management framework simplifies defining, managing, and enforcing security policies.  ...  Enforci ng appropriate security policies in distributed, component-based applications is difficult.  ...  We also don't discuss the principal limitations of security enforcement at the middleware level. We aim for access control on invocations at the middleware level.  ... 
doi:10.1145/1101516.1101521 dblp:conf/middleware/RitterSL05 fatcat:l3kqkekrdbbfrd3joj4ty46v2m

Integrating Security Policies via Container Portable Interceptors

T. Ritter, R. Schreiner, U. Lang
2006 IEEE Distributed Systems Online  
Integrating CORBA component-based and model-driven middleware and a policy management framework simplifies defining, managing, and enforcing security policies.  ...  Enforci ng appropriate security policies in distributed, component-based applications is difficult.  ...  We also don't discuss the principal limitations of security enforcement at the middleware level. We aim for access control on invocations at the middleware level.  ... 
doi:10.1109/mdso.2006.44 fatcat:pcpm4ijve5cqnnpdnrfeqmpc3q

Towards policy-based management of sensor networks

Nelson Matthys, Wouter Joosen
2008 Proceedings of the 3rd international workshop on Middleware for sensor networks - MidSens '08  
We first give an overview of existing research on policies in traditional middleware and describe some of the shortcomings when applying them for managing sensor networks.  ...  This paper proposes a policy-based approach that offers a higher level of abstraction to manage these distributed applications in an easier way.  ...  Research for this paper was sponsored by IBBT, the Interdisciplinary institute for BroadBand Technology, and conducted in the context of the IBBT-DEUS project [9] .  ... 
doi:10.1145/1462698.1462701 dblp:conf/middleware/MatthysJ08 fatcat:brbz7xyidvbnrbjve6h7h6trpa

Android Security Framework: Enabling Generic and Extensible Access Control on Android [article]

Michael Backes, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky
2014 arXiv   pre-print
reference monitoring, and type enforcement.  ...  We introduce the Android Security Framework (ASF), a generic, extensible security framework for Android that enables the development and integration of a wide spectrum of security models in form of code-based  ...  The front-end app allows the user to adjust policy settings and to view logs of security-relevant events.  ... 
arXiv:1404.1395v1 fatcat:vyo3igum7bfidd6mmpx6zbskxa

Policy-Based Quality of Service and Security Management for Multimedia Services on IP Networks in the RTIPA Project [chapter]

Valérie Gay, Sandrine Duflos, Brigitte Kervella, Gladys Diaz, Eric Horlait
2002 Lecture Notes in Computer Science  
This paper summarizes the research work that has been conducted in the context of the RTIPA project on policy-based QoS (Quality of Service) and security management for distributed multimedia services.  ...  It is a step towards an end-to-end QoS and security management for distributed multimedia services running on the new generation of IP networks.  ...  Acknowledgements The authors would like to thank the members of the RTIPA project, Qosmos and the APS group of the university of Twente for their valuable comments on this work.  ... 
doi:10.1007/3-540-45812-3_3 fatcat:d7tk4v7ftnexpp3wzzi5ifinhy

Model Driven Security Management: Making Security Management Manageable in Complex Distributed Systems

Ulrich Lang, Rudolf Schreiner
2008 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems  
This includes the definition of correct security policies at various abstraction layers, and also in the unified and correct management and enforcement of the correct security policy at all relevant places  ...  Today, the challenge in security of complex distributed systems does not anymore lie in encryption or access control of a single middleware platform, but in the protection of the system as a whole.  ...  The next step is to distribute the generated authorization rules across the distributed, heterogeneous IT environment to enable runtime security enforcement of information flows through local Policy Enforcement  ... 
dblp:conf/models/LangS08 fatcat:4otdhas2gndwnp6y4fkify2dom

Policy-Based Security for Wireless Components in High Assurance Computer Systems

Luay A. Wahsheh, Jim Alves-Foss
2007 Journal of Computer Science  
safety-critical multi-enclave systems to provide a framework for supporting the enforcement of diverse security multi-policies.  ...  Applying the policy refinement rules presented in this work for a security enforcement procedure of an application system will reduce the proof effort for secure components.  ...  The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of AFRL  ... 
doi:10.3844/jcssp.2007.726.735 fatcat:sxnytehbf5gk3oprkyufdftllq

PeRA: Individual Privacy Control in Intelligent Transportation Systems

Martin Kost, Raffael Dzikowski, Johann-Christoph Freytag
2013 Datenbanksysteme für Business, Technologie und Web  
The PeRA architecture includes an integrity protection layer to create a distributed policy enforcement perimeter between ITS nodes, which prevents the circumvention of policies.  ...  In contrast, we consider to implement individual privacy requirements for the complete data flow of distributed systems.  ...  We developed a policy-based privacy enforcement architecture which provides an application independent privacy middleware for ITS.  ... 
dblp:conf/btw/KostDF13 fatcat:om3o5selqncw5f7veco4pmzy44

An architecture for policy-based security management for distributed multimedia services

Sandrine Duflos, Brigitte Kervella, Eric Horlait
2002 Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02  
In this paper, I will describe my Ph.D. research work on a multi level architecture to manage security for distributed multimedia services through the use of policies.  ...  This architecture highlights the usefulness of policies, for the expression, the set up and the enforcement of the security in a distributed system.  ...  A comparative study of policy specification language has been done to identify a good language to secure distributed multimedia services [2] .  ... 
doi:10.1145/641007.641138 dblp:conf/mm/DuflosKH02 fatcat:m4rw6frimrcbxin4uecf3bl4uy

An architecture for policy-based security management for distributed multimedia services

Sandrine Duflos, Brigitte Kervella, Eric Horlait
2002 Proceedings of the tenth ACM international conference on Multimedia - MULTIMEDIA '02  
In this paper, I will describe my Ph.D. research work on a multi level architecture to manage security for distributed multimedia services through the use of policies.  ...  This architecture highlights the usefulness of policies, for the expression, the set up and the enforcement of the security in a distributed system.  ...  A comparative study of policy specification language has been done to identify a good language to secure distributed multimedia services [2] .  ... 
doi:10.1145/641135.641138 fatcat:7sruallbkfhkzhap43yqcvn53i

Camflow: Managed Data-Sharing for Cloud Services

Thomas F. J.-M. Pasquier, Jatinder Singh, David Eyers, Jean Bacon
2017 IEEE Transactions on Cloud Computing  
Traditional access control is application and principal/role specific, applied at policy enforcement points, after which there is no subsequent control over where data flows; a crucial issue once data  ...  We discuss the potential of cloud-deployed IFC for enforcing owners' dataflow policy with regard to protection and sharing, as well as safeguarding against malicious or buggy software.  ...  We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre.  ... 
doi:10.1109/tcc.2015.2489211 fatcat:bytla3mpwfhwjgr52yqj5ghewm
« Previous Showing results 1 — 15 out of 4,150 results