Skip to main content
Erschienen in: Annals of Telecommunications 3-4/2019

06.11.2018

A situation-driven framework for dynamic security management

verfasst von: Romain Laborde, Arnaud Oglaza, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri

Erschienen in: Annals of Telecommunications | Ausgabe 3-4/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We present a dynamic security management framework where security policies are specified according to situations. Situation-based policies easily express complex dynamic security measures, are closer to business, and simplify the policy life cycle management. Situations are specified using complex event processing techniques. The framework is supported by a modular event–based infrastructure where a dedicated situation manager maintains active situations allowing the command center to take dynamic situation–based authorization and obligation decisions. The whole framework has been implemented and showed good performance by simulation. Finally, we detail two real experiments.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Harkins M (2012) Managing risk and information security: protect to enable Apress Harkins M (2012) Managing risk and information security: protect to enable Apress
2.
Zurück zum Zitat Laborde R, Oglaza A, Barrère F, Benzekri A (2017) dynsmaug: a dynamic security management framework driven by situations. In: Cyber Security in Networking Conference (CSNet), 2017. IEEE, pp 1–8 Laborde R, Oglaza A, Barrère F, Benzekri A (2017) dynsmaug: a dynamic security management framework driven by situations. In: Cyber Security in Networking Conference (CSNet), 2017. IEEE, pp 1–8
3.
Zurück zum Zitat Agrawal D, Lee K-W, Lobo J (2005) Policy-based management of networked computing systems. IEEE Commun Mag 43(10):69–75CrossRef Agrawal D, Lee K-W, Lobo J (2005) Policy-based management of networked computing systems. IEEE Commun Mag 43(10):69–75CrossRef
4.
Zurück zum Zitat Westerinen A, Strassner J, Scherling M, Quinn B, Herzog S, Huynh A, Carlson M, Perry J, Waldbusser S (2001) Terminology for policy-based management ietf rfc 3198 Westerinen A, Strassner J, Scherling M, Quinn B, Herzog S, Huynh A, Carlson M, Perry J, Waldbusser S (2001) Terminology for policy-based management ietf rfc 3198
5.
Zurück zum Zitat Chadwick D, Zhao G, Otenko S, Laborde R, Su L, Nguyen TA (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience 20(11):1341–1357CrossRef Chadwick D, Zhao G, Otenko S, Laborde R, Su L, Nguyen TA (2008) PERMIS: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience 20(11):1341–1357CrossRef
6.
Zurück zum Zitat Barrėre F, Benzekri A, Frasset F, Laborde R (2002) A multi-domain security policy distribution architecture for dynamic IP based VPN management. In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), pp 224–227 Barrėre F, Benzekri A, Frasset F, Laborde R (2002) A multi-domain security policy distribution architecture for dynamic IP based VPN management. In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), pp 224–227
7.
Zurück zum Zitat Lymberopoulos L, Lupu E, Sloman M (2003) An adaptive policy-based framework for network services management. J Netw Syst Manag 11(3):277–303CrossRef Lymberopoulos L, Lupu E, Sloman M (2003) An adaptive policy-based framework for network services management. J Netw Syst Manag 11(3):277–303CrossRef
8.
Zurück zum Zitat Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4–7CrossRef Dey AK (2001) Understanding and using context. Pers Ubiquit Comput 5(1):4–7CrossRef
9.
Zurück zum Zitat Barwise J, Perry J (1980) The situation underground. Stanford University Press, Stanford Barwise J, Perry J (1980) The situation underground. Stanford University Press, Stanford
10.
Zurück zum Zitat Endsley MR (1988) Design and evaluation for situation awareness enhancement. In: Proceedings of the human factors and ergonomics society annual meeting, vol 132, no 2. SAGE Publications, pp 97–101 Endsley MR (1988) Design and evaluation for situation awareness enhancement. In: Proceedings of the human factors and ergonomics society annual meeting, vol 132, no 2. SAGE Publications, pp 97–101
11.
Zurück zum Zitat Adi A, Etzion O (2004) Amit - the situation manager. The VLDB Journal—The International Journal on Very Large Data Bases 13(2):177–203CrossRefMATH Adi A, Etzion O (2004) Amit - the situation manager. The VLDB Journal—The International Journal on Very Large Data Bases 13(2):177–203CrossRefMATH
12.
Zurück zum Zitat Luckham D (2008) The power of events: an introduction to complex event processing in distributed enterprise systems. In: Workshop on Rules and Rule Markup Languages for the Semantic Web. Springer, p 3 Luckham D (2008) The power of events: an introduction to complex event processing in distributed enterprise systems. In: Workshop on Rules and Rule Markup Languages for the Semantic Web. Springer, p 3
14.
Zurück zum Zitat Hu VC, Ferraiolo D, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone K (2016) Guide to attribute based access control (ABAC) definition and considerations, NIST, Tech. Rep. SP 800–162 Hu VC, Ferraiolo D, Kuhn R, Schnitzer A, Sandlin K, Miller R, Scarfone K (2016) Guide to attribute based access control (ABAC) definition and considerations, NIST, Tech. Rep. SP 800–162
15.
Zurück zum Zitat Laborde R, Barrère F, Benzekri A (2013) Toward authorization as a service: a study of the xacml standard. In: Proceedings of the 16th Communications & Networking Symposium. SCS, p 9 Laborde R, Barrère F, Benzekri A (2013) Toward authorization as a service: a study of the xacml standard. In: Proceedings of the 16th Communications & Networking Symposium. SCS, p 9
16.
Zurück zum Zitat Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp 1639–1644 Oglaza A, Laborde R, Zaraté P (2013) Authorization policies: using decision support system for context-aware protection of user’s private data. In: International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, pp 1639–1644
18.
Zurück zum Zitat Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709–757CrossRef Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709–757CrossRef
19.
Zurück zum Zitat Son J, Kim J-D, Na H-S, Baik D-K (2015) CBDAC: context-based dynamic access control model using intuitive 5w1h for ubiquitous sensor network, International Journal of Distributed Sensor Networks Son J, Kim J-D, Na H-S, Baik D-K (2015) CBDAC: context-based dynamic access control model using intuitive 5w1h for ubiquitous sensor network, International Journal of Distributed Sensor Networks
20.
Zurück zum Zitat Kim Y-G, Lim J (2007) Dynamic activation of role on RBAC for ubiquitous applications. In: 2007 International Conference on Convergence Information Technology. IEEE, pp 1148–1153 Kim Y-G, Lim J (2007) Dynamic activation of role on RBAC for ubiquitous applications. In: 2007 International Conference on Convergence Information Technology. IEEE, pp 1148–1153
21.
Zurück zum Zitat Yau SS, Yao Y, Banga V (2005) Situation-aware access control for service-oriented autonomous decentralized systems. In: Autonomous Decentralized Systems, 2005. ISADS 2005, Proceedings. IEEE, pp 17–24 Yau SS, Yao Y, Banga V (2005) Situation-aware access control for service-oriented autonomous decentralized systems. In: Autonomous Decentralized Systems, 2005. ISADS 2005, Proceedings. IEEE, pp 17–24
22.
Zurück zum Zitat Kayes ASM, Han J, Colman A (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253–277CrossRef Kayes ASM, Han J, Colman A (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253–277CrossRef
23.
Zurück zum Zitat Kabbani B, Laborde R, Barrere F, Benzekri A (2014) Specification and enforcement of dynamic authorization policies oriented by situations. In: 2014 6th International Conference on New Technologies Mobility and Security (NTMS). IEEE, pp 1–6 Kabbani B, Laborde R, Barrere F, Benzekri A (2014) Specification and enforcement of dynamic authorization policies oriented by situations. In: 2014 6th International Conference on New Technologies Mobility and Security (NTMS). IEEE, pp 1–6
24.
Zurück zum Zitat Kabbani B, Laborde R, Barrère F, Benzekri A (2014) Managing Break-The-Glass using Situation-oriented authorizations. In: 9ème conférence sur la sécurité des Architectures réseaux et systèmes d’Information-SAR-SSI 2014 Kabbani B, Laborde R, Barrère F, Benzekri A (2014) Managing Break-The-Glass using Situation-oriented authorizations. In: 9ème conférence sur la sécurité des Architectures réseaux et systèmes d’Information-SAR-SSI 2014
25.
Zurück zum Zitat Marie P, Desprats T, Chabridon S, Sibilla M, Taconet C (2015) From ambient sensing to iot-based context computing: an open framework for end to end qoc management. Sensors 15(6):14180–14206CrossRef Marie P, Desprats T, Chabridon S, Sibilla M, Taconet C (2015) From ambient sensing to iot-based context computing: an open framework for end to end qoc management. Sensors 15(6):14180–14206CrossRef
Metadaten
Titel
A situation-driven framework for dynamic security management
verfasst von
Romain Laborde
Arnaud Oglaza
Ahmad Samer Wazan
François Barrère
Abdelmalek Benzekri
Publikationsdatum
06.11.2018
Verlag
Springer International Publishing
Erschienen in
Annals of Telecommunications / Ausgabe 3-4/2019
Print ISSN: 0003-4347
Elektronische ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-018-0673-0

Weitere Artikel der Ausgabe 3-4/2019

Annals of Telecommunications 3-4/2019 Zur Ausgabe

Neuer Inhalt