Sciweavers

Share
SUTC
2008
IEEE

Security Enforcement Model for Distributed Usage Control

10 years 6 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous access control in dynamic computing environments where subject attributes and system states can be changed. Particularly, this is very useful in specifying security requirements to control the usage of an object after it is released into a distributed environment, which is regarded as one of the fundamental security issues in many distributed systems. However, the enabling technology for usage control is a challenging problem and the space has not been fully explored yet. In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and then propose a general platform architecture and enforcement mechanism by following these requirements. According to our usage control requirements, we augment the traditional SELinux MAC enforcement mechanism by...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
Added 01 Jun 2010
Updated 01 Jun 2010
Type Conference
Year 2008
Where SUTC
Authors Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
Comments (0)
books