Title :
Security Enforcement Model for Distributed Usage Control
Author :
Zhang, Xinwen ; Seifert, Jean-Pierre ; Sandhu, Ravi
Author_Institution :
Samsung Inf. Syst. America, San Jose, CA
Abstract :
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous access control in dynamic computing environments where subject attributes and system states can be changed. Particularly, this is very useful in specifying security requirements to control the usage of an object after it is released into a distributed environment, which is regarded as one of the fundamental security issues in many distributed systems. However, the enabling technology for usage control is a challenging problem and the space has not been fully explored yet. In this paper we identify the general requirements of a trusted usage control enforcement in heterogeneous computing environments, and then propose a general platform architecture and enforcement mechanism by following these requirements. According to our usage control requirements, we augment the traditional SELinux MAC enforcement mechanism by considering subject/object integrity and environmental information. The result shows that our framework is effective in practice and can be seen as a general solution for usage control in distributed and pervasive computing environments with widely deployed trusted computing technologies on various computing devices.
Keywords :
Linux; access protocols; authorisation; data integrity; distributed processing; formal specification; SELinux MAC enforcement mechanism; continuous access control; distributed computing systems; distributed usage control; dynamic computing environments; heterogeneous computing environments; security enforcement model; security requirement specification; subject-object integrity; Access control; Computer networks; Control systems; Distributed computing; Distributed control; Identity management systems; Information security; Pervasive computing; Protection; Space technology;
Conference_Titel :
Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC '08. IEEE International Conference on
Conference_Location :
Taichung
Print_ISBN :
978-0-7695-3158-8
Electronic_ISBN :
978-0-7695-3158-8
DOI :
10.1109/SUTC.2008.79