The Specification and Enforcement of Advanced Security Policies

  • Authors:
  • T. Ryutov;C. Neuman

  • Affiliations:
  • -;-

  • Venue:
  • POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a distributed multi-user environment, the security policymust not only specify legitimate user privileges but alsoaid in the detection of the abuse of the privileges and adaptto perceived system threat conditions.This paper advocates extending authorization policyevaluation mechanisms with a means for generating auditdata allowing immediate notification of suspicious applicationlevel activity. It additionally suggests that the evaluationof the policies themselves adapt to perceived networkthreat conditions, possibly affected by the receipt of such auditdata by other processes.Such advanced policies assist in detecting and respondingto intrusion and misuse and they allow more efficient utilizationof security services, such as authentication, audit,and notification.We present an authorization framework, which enablesthe representation and enforcement of advanced securitypolicies. Our approach is based on expanding the policyevaluation mechanism with the ability to generate real timeactions, such as checking the current system threat level andsending a notification.