Proceedings of the 28th Annual Computer Security Applications Conference 2012
DOI: 10.1145/2420950.2420991
|View full text |Cite
|
Sign up to set email alerts
|

Transforming commodity security policies to enforce Clark-Wilson integrity

Abstract: Modern distributed systems are composed from several offthe-shelf components, including operating systems, virtualization infrastructure, and application packages, upon which some custom application software (e.g., web application) is often deployed. While several commodity systems now include mandatory access control (MAC) enforcement to protect the individual components, the complexity of such MAC policies and the myriad of possible interactions among individual hosts in distributed systems makes it difficul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 37 publications
0
6
0
Order By: Relevance
“…The linear 3-cut problem also arose from one such application. Muthukumaran et al [10] and Talele et al [11] formulated the problem of placing security mediators in a distributed system as a cut problem. They modeled a distributed system as a directed graph with arcs indicating the direction of possible communication.…”
Section: Motivationsmentioning
confidence: 99%
“…The linear 3-cut problem also arose from one such application. Muthukumaran et al [10] and Talele et al [11] formulated the problem of placing security mediators in a distributed system as a cut problem. They modeled a distributed system as a directed graph with arcs indicating the direction of possible communication.…”
Section: Motivationsmentioning
confidence: 99%
“…These methods focus on only one layer of the system, such as the network, a single host, or a single program because the size of the graphs becomes prohibitive. A recent work that reasons about data flows in distributed systems only handles systems with tens of hosts [23]. As a result, such methods are not usable for organizations with several networks containing many hosts.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have explored methods for solving the mediator placement problem to monitor security in networks [27], hosts [23,30], and individual programs [18,13,20]. These techniques convert the operations authorized by network policies, network topology, host policies, and program code, respectively, into data flow graphs.…”
mentioning
confidence: 99%
See 2 more Smart Citations