Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

Dynamic Deployment and Monitoring of Security Policies

verfasst von : Jose-Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca

Erschienen in: Trust, Privacy and Security in Digital Business

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

INTER-TRUST is a framework for the specification, negotiation, deployment and dynamic adaptation of interoperable security policies, in the context of pervasive systems where devices are constantly exchanging critical information through the network. The dynamic adaptation of the security policies at runtime is addressed using Aspect-Oriented Programming (AOP) that allows enforcing security requirements by dynamically weaving security aspects into the applications. However, a mechanism to guarantee the correct adaptation of the functionality that enforces the changing security policies is needed. In this paper, we present an approach with monitoring and detection techniques in order to maintain the correlation between the security policies and the associated functionality deployed using AOP, allowing the INTER-TRUST framework automatically reacts when needed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)MATHCrossRef Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)MATHCrossRef
3.
Zurück zum Zitat Ayed, S., Idrees, M.S., Cuppens-Boulahia, N., Cuppens, F., Pinto, M., Fuentes, L.: Security aspects: a framework for enforcement of security policies using AOP. In: Signal-Image Technology & Internet-Based Systems, SITIS, pp. 301–308 (2013) Ayed, S., Idrees, M.S., Cuppens-Boulahia, N., Cuppens, F., Pinto, M., Fuentes, L.: Security aspects: a framework for enforcement of security policies using AOP. In: Signal-Image Technology & Internet-Based Systems, SITIS, pp. 301–308 (2013)
4.
Zurück zum Zitat Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997) CrossRef Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.M., Irwin, J.: Aspect-oriented programming. In: Akşit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220–242. Springer, Heidelberg (1997) CrossRef
5.
Zurück zum Zitat Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Policies for Distributed Systems and Networks (2003) Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Policies for Distributed Systems and Networks (2003)
6.
Zurück zum Zitat Autrel, F., Cuppens, F., Cuppens, N., Coma, C.: MotOrBAC 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems, SARSSI (2008) Autrel, F., Cuppens, F., Cuppens, N., Coma, C.: MotOrBAC 2: a security policy tool. In: Third Joint Conference on Security in Networks Architectures and Security of Information Systems, SARSSI (2008)
7.
Zurück zum Zitat Morales, G., Maag, S., Cavalli, A., Mallouli, W., de Oca, E., Wehbi, B.: Timed extended invariants for the passive testing of web services. In: IEEE International Conference on Web Services, pp. 592–599 (2010) Morales, G., Maag, S., Cavalli, A., Mallouli, W., de Oca, E., Wehbi, B.: Timed extended invariants for the passive testing of web services. In: IEEE International Conference on Web Services, pp. 592–599 (2010)
8.
Zurück zum Zitat Mallouli, W., Wehbi, B., de Oca, E.M., Bourdelles, M.: Online network traffic security inspection using MMT tool. In: System Testing and Validation (2012) Mallouli, W., Wehbi, B., de Oca, E.M., Bourdelles, M.: Online network traffic security inspection using MMT tool. In: System Testing and Validation (2012)
9.
Zurück zum Zitat Wehbi, B., de Oca, E., Bourdelles, M.: Events-based security monitoring using MMT Tool. In: Software Testing, Verification and Validation (2012) Wehbi, B., de Oca, E., Bourdelles, M.: Events-based security monitoring using MMT Tool. In: Software Testing, Verification and Validation (2012)
10.
Zurück zum Zitat Howard, M., Lipner, S.: Inside the windows security push. IEEE Secur. Priv. 1(1), 57–61 (2003)CrossRef Howard, M., Lipner, S.: Inside the windows security push. IEEE Secur. Priv. 1(1), 57–61 (2003)CrossRef
11.
Zurück zum Zitat Cavalli, A., de Oca, E., Mallouli, W., Lallali, M.: Two complementary tools for the formal testing of distributed systems with time constraints. In: Distributed Simulation and Real-Time Applications(2008) Cavalli, A., de Oca, E., Mallouli, W., Lallali, M.: Two complementary tools for the formal testing of distributed systems with time constraints. In: Distributed Simulation and Real-Time Applications(2008)
12.
Zurück zum Zitat Andrade, R., Rebelo, H., Ribeiro, M., Borba, P.: AspectJ-based idioms for flexible feature binding. In: VII Brazilian Symposium on Software Components, Architectures and Reuse, SBCARS, pp. 59–68 (2013) Andrade, R., Rebelo, H., Ribeiro, M., Borba, P.: AspectJ-based idioms for flexible feature binding. In: VII Brazilian Symposium on Software Components, Architectures and Reuse, SBCARS, pp. 59–68 (2013)
13.
Zurück zum Zitat Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537–552. Springer, Heidelberg (2008) CrossRef Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537–552. Springer, Heidelberg (2008) CrossRef
14.
Zurück zum Zitat De Borger, W., De Win, B., Lagaisse, B., Joosen, W.: A permission system for secure AOP. In: Aspect-Oriented Software Development (2010) De Borger, W., De Win, B., Lagaisse, B., Joosen, W.: A permission system for secure AOP. In: Aspect-Oriented Software Development (2010)
15.
Zurück zum Zitat Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, NDSS, pp. 107–121 (2003) Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, NDSS, pp. 107–121 (2003)
16.
Zurück zum Zitat Zhang, S., Zhao, J.: On identifying bug patterns in aspect-oriented programs.In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 1, pp. 431–438 (2007) Zhang, S., Zhao, J.: On identifying bug patterns in aspect-oriented programs.In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, vol. 1, pp. 431–438 (2007)
17.
Zurück zum Zitat De Win, B., Piessens, F., Joosen, W.: How secure is AOP and what can we do about it? In: Software Engineering for Secure Systems, pp. 27–34 (2006) De Win, B., Piessens, F., Joosen, W.: How secure is AOP and what can we do about it? In: Software Engineering for Secure Systems, pp. 27–34 (2006)
18.
Zurück zum Zitat Serme, G., De Oliveira, A.S., Guarnieriy, M., El Khoury, P.: Towards assisted remediation of security vulnerabilities. In: 6th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2012) Serme, G., De Oliveira, A.S., Guarnieriy, M., El Khoury, P.: Towards assisted remediation of security vulnerabilities. In: 6th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE (2012)
19.
Zurück zum Zitat Padayachee, K., Eloff, J.: An aspect-oriented model to monitor misuse. In: Sobh, T. (ed.) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pp. 273–278. Springer, Netherlands (2007)CrossRef Padayachee, K., Eloff, J.: An aspect-oriented model to monitor misuse. In: Sobh, T. (ed.) Innovations and Advanced Techniques in Computer and Information Sciences and Engineering, pp. 273–278. Springer, Netherlands (2007)CrossRef
20.
Zurück zum Zitat Pinto, M., Gámez, N., Fuentes, L., Amor, M., Horcas, J.M., Ayala, I.: Dynamic reconfiguration of security policies in wireless sensor networks. Sens. 15(3), 5251 (2015)CrossRef Pinto, M., Gámez, N., Fuentes, L., Amor, M., Horcas, J.M., Ayala, I.: Dynamic reconfiguration of security policies in wireless sensor networks. Sens. 15(3), 5251 (2015)CrossRef
21.
Zurück zum Zitat Horcas, J.-M., Pinto, M., Fuentes, L.: Runtime enforcement of dynamic security policies. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 340–356. Springer, Heidelberg (2014) Horcas, J.-M., Pinto, M., Fuentes, L.: Runtime enforcement of dynamic security policies. In: Avgeriou, P., Zdun, U. (eds.) ECSA 2014. LNCS, vol. 8627, pp. 340–356. Springer, Heidelberg (2014)
Metadaten
Titel
Dynamic Deployment and Monitoring of Security Policies
verfasst von
Jose-Miguel Horcas
Mónica Pinto
Lidia Fuentes
Wissam Mallouli
Edgardo Montes de Oca
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-22906-5_14

Premium Partner