DocumentCode :
2599770
Title :
Towards Remote Attestation of Security Policies
Author :
Zhang, Qian ; He, Yeping ; Meng, Ce
Author_Institution :
Inst. of Software, Chinese Acad. of Sci., Beijing, China
Volume :
2
fYear :
2010
fDate :
24-25 April 2010
Firstpage :
475
Lastpage :
478
Abstract :
In the environment which supports access control, the behaviors of an application not only depend on the logic of its code, also depend on the security policy enforced in the system. So, while verifying the trustworthy of a remote application, related security policy should be verified besides the application itself. However, the security policies to restrict different applications are commonly mixed as an aggregation, and the alteration of any statement will influence the final binary file of policy, which makes the integrity measurement in mutability, so it´s difficult to verify the integrity of security policies by existing methods which search the measurement in a standard measurement library. For this reason, this paper presents a method for remote attestation of security policy, we firstly divide the security policy into smaller low-coupling modules, and then verify the properties of security policy based on the set of all modules´ measurement in the process of remote attestation, thus we can effectively reduce the size of standard measurement library, and this makes remote attestation of security policy more easily in the complex distributed environment. In addition, to validate the feasibility of our method, we design and implement some key parts of remote attestation with the policy of SELinux, then analyze the procedure of building trust chain in it.
Keywords :
security of data; SELinux; remote attestation; security policies; Binary codes; Computer networks; Data security; Helium; Information security; Libraries; Measurement standards; Size measurement; Virtual manufacturing; Wireless communication; SELinux policy; remote attestation; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-4011-5
Electronic_ISBN :
978-1-4244-6598-9
Type :
conf
DOI :
10.1109/NSWCTC.2010.245
Filename :
5480909
Link To Document :
بازگشت