2010
DOI: 10.1007/978-3-642-16955-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Middleware Enforcement of Event Flow Security Policy

Abstract: Distributed, event-driven applications that process sensitive user data and involve multiple organisational domains must comply with complex security requirements. Ideally, developers want to express security policy for such applications in data-centric terms, controlling the flow of information throughout the system. Current middleware does not support the specification of such end-to-end security policy and lacks uniform mechanisms for enforcement. We describe DEFCon-Policy, a middleware that enforces securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…The work developing a Data Distribution Infrastructure (DDI) [15] works to ensure distributed policy enforcement by integrating services into local enforcement infrastructures but simply assumes remote trust capabilities are present. Various other contributions to the area rely on homogeneous components [25], expect policy breaches to be prosecuted via review audits [7], work under assumptions that leave trust establishment as out of scope [13] [20] [19], or simply acknowledge that trusted attestation services could strengthen the system without considering how to incorporate them [6]. Our work looks to facilitate verifiable attribute collection, which allows informed policy decisions without strict component knowledge prior to policy authoring.…”
Section: B Related Workmentioning
confidence: 99%
“…The work developing a Data Distribution Infrastructure (DDI) [15] works to ensure distributed policy enforcement by integrating services into local enforcement infrastructures but simply assumes remote trust capabilities are present. Various other contributions to the area rely on homogeneous components [25], expect policy breaches to be prosecuted via review audits [7], work under assumptions that leave trust establishment as out of scope [13] [20] [19], or simply acknowledge that trusted attestation services could strengthen the system without considering how to incorporate them [6]. Our work looks to facilitate verifiable attribute collection, which allows informed policy decisions without strict component knowledge prior to policy authoring.…”
Section: B Related Workmentioning
confidence: 99%
“…This has made it difficult to operate for the common user. DEFCON 31 and SafeWeb 32 both track data at message level. DStar 29 facilitates IFC in distributed systems.…”
Section: Related Workmentioning
confidence: 99%
“…Any solution that detects data leakage should be easily deployable in today's PaaS environments. Existing information flow tracking (IFT) systems [83] can track the propagation of data through a system but require substantial changes to the OS or cloud stack, or make specific assumptions about the architecture of applications [52,98,58]. Approaches for remotely verifying the software installed on cloud platforms based on trusted hardware [80] require costly hardware and software upgrades in a cloud environment.…”
Section: Requirements and Existing Solutionsmentioning
confidence: 99%
“…Information flow control (IFC) techniques have been employed in a variety of contexts, including at the OS [97,52], middleware [58] and language levels [93,67], databases [82] and in distributed settings [98].…”
Section: Related Workmentioning
confidence: 99%