Skip to main content

2017 | OriginalPaper | Buchkapitel

Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

verfasst von : Vasileios Gkioulos, Stephen D. Wolthusen

Erschienen in: Advances in Network Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Tactical networks are typically of an ad-hoc nature operating in highly restricted environments and constrained resources. The frequent presence of communication disruptions and network partitioning must also be expected and managed, while core functionalities must be maintained, providing asynchronous invocation and access to services in a distributed manner. Supporting the required functionalities of the contemporary tactical environment, requires the dynamic evaluation of security policies, incorporating semantic knowledge from various network layers, together with facts and rules that are defined axiomatically a priori. However, the required basis for such policy decisions can be excessively extended and dynamic. Thus, it is desirable to locally minimize the scope of the policy maximizing efficiency. In this paper, we therefore analyze criteria and optimization goals for the a priori distribution and partitioning of security policies, ensuring the continuous support of the required capabilities, given the operational tasks of each deployed actor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Horne, G., Leonardi, M.: Maneuver warfare science 2001 (2001) Horne, G., Leonardi, M.: Maneuver warfare science 2001 (2001)
2.
Zurück zum Zitat Bar-Noy, A., Cirincione, G. Govindan, R. Krishnamurthy, S., LaPorta, T., Mohapatra, P., Neely, M., Yener, A.: Quality-of-information aware networking for tactical military networks. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 2–7, Mar 2011 Bar-Noy, A., Cirincione, G. Govindan, R. Krishnamurthy, S., LaPorta, T., Mohapatra, P., Neely, M., Yener, A.: Quality-of-information aware networking for tactical military networks. In: 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 2–7, Mar 2011
3.
Zurück zum Zitat Burbank, J., Chimento, P., Haberman, B., Kasch, W.: Key challenges of military tactical networking and the elusive promise of manet technology. IEEE Commun. Mag. 44, 39–45 (2006)CrossRef Burbank, J., Chimento, P., Haberman, B., Kasch, W.: Key challenges of military tactical networking and the elusive promise of manet technology. IEEE Commun. Mag. 44, 39–45 (2006)CrossRef
4.
Zurück zum Zitat Elmasry, G.: A comparative review of commercial versus tactical wireless networks. IEEE Commun. Mag. 48, 54–59 (2010)CrossRef Elmasry, G.: A comparative review of commercial versus tactical wireless networks. IEEE Commun. Mag. 48, 54–59 (2010)CrossRef
5.
Zurück zum Zitat Shi, V.: Evaluating the performability of tactical communications networks. IEEE Trans. Veh. Technol. 53, 253–260 (2004)CrossRef Shi, V.: Evaluating the performability of tactical communications networks. IEEE Trans. Veh. Technol. 53, 253–260 (2004)CrossRef
6.
Zurück zum Zitat Moffat, J.: Adapting Modeling & Simulation for Network Enabled Operations (2011) Moffat, J.: Adapting Modeling & Simulation for Network Enabled Operations (2011)
7.
Zurück zum Zitat Alberts, D.S., Hayes, R.E.: Power to the Edge (2003) Alberts, D.S., Hayes, R.E.: Power to the Edge (2003)
8.
Zurück zum Zitat Smith, E.A.: Complexity, Networking, and Effects-Based Approaches to Operations (2006) Smith, E.A.: Complexity, Networking, and Effects-Based Approaches to Operations (2006)
9.
Zurück zum Zitat Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45, 47–53 (2007)CrossRef Lund, K., Eggen, A., Hadzic, D., Hafsoe, T., Johnsen, F.: Using web services to realize service oriented architecture in military communication networks. IEEE Commun. Mag. 45, 47–53 (2007)CrossRef
10.
Zurück zum Zitat Johnsen, F., Bloebaum, T., Schenkels, L., Fiske, R., Van Selm, M., de Sortis, V., van der Zanden, A., Sliwa, J., Caban, P.: Soa over disadvantaged grids experiment and demonstrator. In: Communications and Information Systems Conference (MCC), 2012 Military, pp. 1–8, Oct 2012 Johnsen, F., Bloebaum, T., Schenkels, L., Fiske, R., Van Selm, M., de Sortis, V., van der Zanden, A., Sliwa, J., Caban, P.: Soa over disadvantaged grids experiment and demonstrator. In: Communications and Information Systems Conference (MCC), 2012 Military, pp. 1–8, Oct 2012
11.
Zurück zum Zitat Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST ’09, pp. 3–10. ACM, New York, NY, USA (2009) Suri, N.: Dynamic service-oriented architectures for tactical edge networks. In: Proceedings of the 4th Workshop on Emerging Web Services Technology, WEWST ’09, pp. 3–10. ACM, New York, NY, USA (2009)
14.
Zurück zum Zitat Maule, R., Lewis, W.: Security for distributed soa at the tactical edge. In: Military Communications Conference, 2010—MILCOM 2010, pp. 13–18, Oct 2010 Maule, R., Lewis, W.: Security for distributed soa at the tactical edge. In: Military Communications Conference, 2010—MILCOM 2010, pp. 13–18, Oct 2010
15.
Zurück zum Zitat Mayott, G., Self, M., Miller, G.J., McDonnell, J.S.: Soa approach to battle command: simulation interoperability (2010) Mayott, G., Self, M., Miller, G.J., McDonnell, J.S.: Soa approach to battle command: simulation interoperability (2010)
16.
Zurück zum Zitat Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lupu, E., Lobo, J. (eds.) Policies for Distributed Systems and Networks, Lecture Notes in Computer Science, vol. 1995, pp. 18–38. Springer, Berlin (2001) Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lupu, E., Lobo, J. (eds.) Policies for Distributed Systems and Networks, Lecture Notes in Computer Science, vol. 1995, pp. 18–38. Springer, Berlin (2001)
17.
Zurück zum Zitat OASIS, Oasis security services (saml) tc OASIS, Oasis security services (saml) tc
18.
Zurück zum Zitat Ramli, C.D.P.K., Nielson, H.R., Nielson, F.: The logic of XACML. Sci. Comput. Prog. 83, 80–105 (2014)CrossRef Ramli, C.D.P.K., Nielson, H.R., Nielson, F.: The logic of XACML. Sci. Comput. Prog. 83, 80–105 (2014)CrossRef
19.
Zurück zum Zitat Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Proceedings. 2002 IEEE Symposium on Security and Privacy, 2002, pp. 114–130 (2002) Li, N., Mitchell, J., Winsborough, W.: Design of a role-based trust-management framework. In: Proceedings. 2002 IEEE Symposium on Security and Privacy, 2002, pp. 114–130 (2002)
20.
Zurück zum Zitat Becker, M., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004, pp. 159–168, June 2004 Becker, M., Sewell, P.: Cassandra: distributed access control policies with tunable expressiveness. In: Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004, pp. 159–168, June 2004
21.
Zurück zum Zitat Nejdl, W., Olmedilla, D., Winslett, M.: Peertrust: Automated trust negotiation for peers on the semantic web. In: Jonker, W., Petkovi, M. (eds.) Secure Data Management, Lecture Notes in Computer Science, vol. 3178 pp. 118–132. Springer, Berlin (2004) Nejdl, W., Olmedilla, D., Winslett, M.: Peertrust: Automated trust negotiation for peers on the semantic web. In: Jonker, W., Petkovi, M. (eds.) Secure Data Management, Lecture Notes in Computer Science, vol. 3178 pp. 118–132. Springer, Berlin (2004)
22.
Zurück zum Zitat Czenko, M., Doumen, J., Etalle, S.: Trust management in p2p systems using standard tulip. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C. (eds.) Trust Management II, FIP The International Federation for Information Processing, vol. 263 pp. 1–16, Springer, US (2008) Czenko, M., Doumen, J., Etalle, S.: Trust management in p2p systems using standard tulip. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C. (eds.) Trust Management II, FIP The International Federation for Information Processing, vol. 263 pp. 1–16, Springer, US (2008)
23.
Zurück zum Zitat Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W.H., Thuraisingham, B.: ROWLBAC—representing role based access control in OWL. In: Proceedings of the 13th Symposium on Access control Models and Technologies, ACM Press, Estes Park, Colorado, USA, June 2008 Finin, T., Joshi, A., Kagal, L., Niu, J., Sandhu, R., Winsborough, W.H., Thuraisingham, B.: ROWLBAC—representing role based access control in OWL. In: Proceedings of the 13th Symposium on Access control Models and Technologies, ACM Press, Estes Park, Colorado, USA, June 2008
24.
Zurück zum Zitat Kagal, L., Finin, T., Paolucci, M., Srinivasan, N., Sycara, K., Denker, G.: Authorization and privacy for semantic web services. IEEE Intell. Syst. 19, 50–56 (2004)CrossRef Kagal, L., Finin, T., Paolucci, M., Srinivasan, N., Sycara, K., Denker, G.: Authorization and privacy for semantic web services. IEEE Intell. Syst. 19, 50–56 (2004)CrossRef
25.
Zurück zum Zitat Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: Kaos policy management for semantic web services. IEEE Intell. Syst. 19, 32–41 (2004)CrossRef Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: Kaos policy management for semantic web services. IEEE Intell. Syst. 19, 32–41 (2004)CrossRef
26.
Zurück zum Zitat Kolter, J., Schillinger, R., Pernul, G.: Building a distributed semantic-aware security architecture. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, IFIP International Federation for Information Processing, vol. 232 pp. 397–408. Springer, US (2007) Kolter, J., Schillinger, R., Pernul, G.: Building a distributed semantic-aware security architecture. In: Venter, H., Eloff, M., Labuschagne, L., Eloff, J., von Solms, R. (eds.) New Approaches for Security, Privacy and Trust in Complex Environments, IFIP International Federation for Information Processing, vol. 232 pp. 397–408. Springer, US (2007)
27.
Zurück zum Zitat Ferrini, R., Bertino, E.: Supporting RBAC with XACML + OWL. In: Carminati, B., Joshi, J. (eds.) Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT ’09), pp. 145–154. ACM Press, Stresa, Italy, June 2009 Ferrini, R., Bertino, E.: Supporting RBAC with XACML + OWL. In: Carminati, B., Joshi, J. (eds.) Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT ’09), pp. 145–154. ACM Press, Stresa, Italy, June 2009
28.
Zurück zum Zitat Ben Brahim, M., Chaari, T., Ben Jemaa, M., Jmaiel, M.: Semantic matching of ws-securitypolicy assertions. In: Pallis, G., Jmaiel, M., Charfi, A., Graupner, S., Karabulut, Y., Guinea, S., Rosenberg, F., Sheng, Q., Pautasso, C., Ben Mokhtar, S. (eds.) Service-Oriented Computing-ICSOC 2011 Workshops, Lecture Notes in Computer Science, vol. 7221, pp. 114–130. Springer, Berlin (2012) Ben Brahim, M., Chaari, T., Ben Jemaa, M., Jmaiel, M.: Semantic matching of ws-securitypolicy assertions. In: Pallis, G., Jmaiel, M., Charfi, A., Graupner, S., Karabulut, Y., Guinea, S., Rosenberg, F., Sheng, Q., Pautasso, C., Ben Mokhtar, S. (eds.) Service-Oriented Computing-ICSOC 2011 Workshops, Lecture Notes in Computer Science, vol. 7221, pp. 114–130. Springer, Berlin (2012)
29.
Zurück zum Zitat Helil, N., Rahman, K.: Extending xacml profile for rbac with semantic concepts. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 10, pp. V10–69–V10–74, Oct 2010 Helil, N., Rahman, K.: Extending xacml profile for rbac with semantic concepts. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 10, pp. V10–69–V10–74, Oct 2010
30.
Zurück zum Zitat Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3rd International Conference on Availability, Reliability and Security, 2008. ARES 08, pp. 813–820, Mar 2008 Blanco, C., Lasheras, J., Valencia-Garcia, R., Fernandez-Medina, E., Toval, A., Piattini, M.: A systematic review and comparison of security ontologies. In: 3rd International Conference on Availability, Reliability and Security, 2008. ARES 08, pp. 813–820, Mar 2008
31.
Zurück zum Zitat Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering Workshops, Lecture Notes in Business Information Processing, vol. 112 pp. 61–69. Springer, Berlin (2012) Souag, A., Salinesi, C., Comyn-Wattiau, I.: Ontologies for security requirements: a literature survey and classification. In: Bajec, M., Eder, J. (eds.) Advanced Information Systems Engineering Workshops, Lecture Notes in Business Information Processing, vol. 112 pp. 61–69. Springer, Berlin (2012)
32.
Zurück zum Zitat Nguyen, V.: Ontologies and information systems: a literature survey 6 (2011) Nguyen, V.: Ontologies and information systems: a literature survey 6 (2011)
33.
Zurück zum Zitat Kolovski, V., Parsia, B., Katz, Y., Hendler, J.: Representing web service policies in owl-dl. In: International Semantic Web Conference (ISWC), pp. 6–10 (2005) Kolovski, V., Parsia, B., Katz, Y., Hendler, J.: Representing web service policies in owl-dl. In: International Semantic Web Conference (ISWC), pp. 6–10 (2005)
34.
Zurück zum Zitat Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J., Etalle, P.S.: A semantic security framework for systems of systems. Int. J. Coop. Inf. Syst. 22, 1–35 (2013)CrossRef Trivellato, D., Zannone, N., Glaundrup, M., Skowronek, J., Etalle, P.S.: A semantic security framework for systems of systems. Int. J. Coop. Inf. Syst. 22, 1–35 (2013)CrossRef
35.
Zurück zum Zitat Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Accepted for presentation at Norwegian Information Security Conference 2015 (NISK-2015) (2015) Gkioulos, V., Wolthusen, S.D.: Enabling dynamic security policy evaluation for service-oriented architectures in tactical networks. In: Accepted for presentation at Norwegian Information Security Conference 2015 (NISK-2015) (2015)
36.
Zurück zum Zitat Nato Architecture Framework, NATO Capability View, NAF v3 NCV-2, June 2013 Nato Architecture Framework, NATO Capability View, NAF v3 NCV-2, June 2013
40.
Zurück zum Zitat Breton, R., Rousseau, R.: The future of c2 the c-ooda: a cognitive version of the ooda loop to represent c2 activities. Topic: C2 process modelling Breton, R., Rousseau, R.: The future of c2 the c-ooda: a cognitive version of the ooda loop to represent c2 activities. Topic: C2 process modelling
41.
Zurück zum Zitat Smith, E.A.: Effects Based Operations. Crisis, and War. Center for Advanced Concepts and Technology, Applying Network Centric Warfare in Peace (2002) Smith, E.A.: Effects Based Operations. Crisis, and War. Center for Advanced Concepts and Technology, Applying Network Centric Warfare in Peace (2002)
42.
Zurück zum Zitat Harrison, F.: The Managerial Decision-Making Process-5th edn. South-Western College Pub (1998) Harrison, F.: The Managerial Decision-Making Process-5th edn. South-Western College Pub (1998)
43.
Zurück zum Zitat Veni, K.K., Balachandar, S.R.: Int. J. Math. Comput. Phys. Electr. Comput. Eng. 4(7), 1044–1048 (2010) Veni, K.K., Balachandar, S.R.: Int. J. Math. Comput. Phys. Electr. Comput. Eng. 4(7), 1044–1048 (2010)
44.
Zurück zum Zitat Balas, E., Glover, F., Zionts, S.: An additive algorithm for solving linear programs with zero-one variables. Oper. Res. 13(4), 517–549 (1965)MathSciNetCrossRef Balas, E., Glover, F., Zionts, S.: An additive algorithm for solving linear programs with zero-one variables. Oper. Res. 13(4), 517–549 (1965)MathSciNetCrossRef
45.
Zurück zum Zitat Frville, A.: The multidimensional 01 knapsack problem: an overview. Eur. J. Oper. Res. 155(1), 1–21 (2004)CrossRef Frville, A.: The multidimensional 01 knapsack problem: an overview. Eur. J. Oper. Res. 155(1), 1–21 (2004)CrossRef
46.
Zurück zum Zitat Ohkura, K., Igarashi, T., Ueda, K., Okauchi, S., Matsunaga, H.: A genetic algorithm approach to large scale combinatorial optimization problems in the advertising industry. In: Proceedings. 2001 8th IEEE International Conference on Emerging Technologies and Factory Automation, 2001, vol. 2, pp. 351–357, Oct 2001 Ohkura, K., Igarashi, T., Ueda, K., Okauchi, S., Matsunaga, H.: A genetic algorithm approach to large scale combinatorial optimization problems in the advertising industry. In: Proceedings. 2001 8th IEEE International Conference on Emerging Technologies and Factory Automation, 2001, vol. 2, pp. 351–357, Oct 2001
47.
Zurück zum Zitat Chu, P., Beasley, J.: A genetic algorithm for the multidimensional knapsack problem. J Heuristics 4(1), 63–86 (1998)CrossRefMATH Chu, P., Beasley, J.: A genetic algorithm for the multidimensional knapsack problem. J Heuristics 4(1), 63–86 (1998)CrossRefMATH
48.
Zurück zum Zitat Balas, E., Martin, C.H.: Pivot and complement heuristic for 0–1 programming. Manag. Sci. 26(1), 86–96 (1980) Balas, E., Martin, C.H.: Pivot and complement heuristic for 0–1 programming. Manag. Sci. 26(1), 86–96 (1980)
49.
Zurück zum Zitat Gavish, B., Pirkul, H.: Efficient algorithms for solving multiconstraint zero-one knapsack problems to optimality. Math. Program. 31(1), 78–105 (1985)MathSciNetCrossRefMATH Gavish, B., Pirkul, H.: Efficient algorithms for solving multiconstraint zero-one knapsack problems to optimality. Math. Program. 31(1), 78–105 (1985)MathSciNetCrossRefMATH
50.
51.
Zurück zum Zitat Osorio, M., Glover, F., Hammer, P.: Cutting and surrogate constraint analysis for improved multidimensional knapsack solutions. Ann. Oper. Res. 117(1–4), 71–93 (2002)MathSciNetCrossRefMATH Osorio, M., Glover, F., Hammer, P.: Cutting and surrogate constraint analysis for improved multidimensional knapsack solutions. Ann. Oper. Res. 117(1–4), 71–93 (2002)MathSciNetCrossRefMATH
52.
Zurück zum Zitat Magazine, M., Oguz, O.: A heuristic algorithm for the multidimensional zero-one knapsack problem. Eur. J. Oper. Res. 16(3), 319–326 (1984)MathSciNetCrossRefMATH Magazine, M., Oguz, O.: A heuristic algorithm for the multidimensional zero-one knapsack problem. Eur. J. Oper. Res. 16(3), 319–326 (1984)MathSciNetCrossRefMATH
53.
Zurück zum Zitat Volgenant, A., Zoon, J.A.: An improved heuristic for multidimensional 0–1 knapsack problems. J. Oper. Res. Soc. 41(10), 963–970 (1990)CrossRefMATH Volgenant, A., Zoon, J.A.: An improved heuristic for multidimensional 0–1 knapsack problems. J. Oper. Res. Soc. 41(10), 963–970 (1990)CrossRefMATH
54.
Zurück zum Zitat Weingartner, H.M., Ness, D.N.: Methods for the solution of the multidimensional 0/1 knapsack problem. Oper. Res. 15(1), 83–103 (1967)CrossRef Weingartner, H.M., Ness, D.N.: Methods for the solution of the multidimensional 0/1 knapsack problem. Oper. Res. 15(1), 83–103 (1967)CrossRef
55.
Zurück zum Zitat Caccetta, L., Kulanoot, A.: Computational aspects of hard knapsack problems. In: Proceedings of the Third World Congress of Nonlinear Analysts Nonlinear Analysis: Theory, Methods & Applications, vol. 47, no. 8, pp. 5547–5558 (2001) Caccetta, L., Kulanoot, A.: Computational aspects of hard knapsack problems. In: Proceedings of the Third World Congress of Nonlinear Analysts Nonlinear Analysis: Theory, Methods & Applications, vol. 47, no. 8, pp. 5547–5558 (2001)
Metadaten
Titel
Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures
verfasst von
Vasileios Gkioulos
Stephen D. Wolthusen
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-44354-6_9