A survey of intrusion detection techniques
Computers and Security
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Compliance Checking in the PolicyMaker Trust Management System
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
A comparison of methods for implementing adaptive security policies
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Unified support for heterogeneous security policies in distributed systems
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Integrated Access Control and Intrusion Detection for Web Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Policies and conflicts in call control
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enforcing provisioning and authorization policy in the Antigone system
Journal of Computer Security
Adaptive Trust Negotiation and Access Control for Grids
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A Survey of Approaches to Adaptive Application Security
SEAMS '07 Proceedings of the 2007 International Workshop on Software Engineering for Adaptive and Self-Managing Systems
Automatic enforcement of location aware user based network access control policies
TELE-INFO'08 Proceedings of the 7th WSEAS International Conference on Telecommunications and Informatics
Location aware self-adapting firewall policies
WSEAS TRANSACTIONS on COMMUNICATIONS
Initial trust formation in Virtual Organisations
International Journal of Internet Technology and Secured Transactions
xDUCON: cross domain usage control through shared data spaces
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Hi-index | 0.00 |
In a distributed multi-user environment, the security policymust not only specify legitimate user privileges but alsoaid in the detection of the abuse of the privileges and adaptto perceived system threat conditions.This paper advocates extending authorization policyevaluation mechanisms with a means for generating auditdata allowing immediate notification of suspicious applicationlevel activity. It additionally suggests that the evaluationof the policies themselves adapt to perceived networkthreat conditions, possibly affected by the receipt of such auditdata by other processes.Such advanced policies assist in detecting and respondingto intrusion and misuse and they allow more efficient utilizationof security services, such as authentication, audit,and notification.We present an authorization framework, which enablesthe representation and enforcement of advanced securitypolicies. Our approach is based on expanding the policyevaluation mechanism with the ability to generate real timeactions, such as checking the current system threat level andsending a notification.