70 likes | 198 Vues
This work explores the creation of an access control model tailored for distributed object systems utilizing mobile code. It addresses various motivation factors including security from agent attacks on platforms and hosts. The text discusses multiple types of security challenges such as unauthorized access, masquerading, and denial of service. It evaluates key access control approaches, like conditional access control and the use of certificates, while outlining steps towards implementing a secure environment. The model aims to be integrated into existing security frameworks, ensuring fine-grained policy enforcement.
E N D
Design of an Access Control Model for Distributed Object System With Mobile Code John Melvin Antony
Motivation • Security • Agent Attacking Agent Platform/Host. • Agent Platform/Host Attacking Agent. • Agent Attacking Another Agent. • Types of Attacks • Masquerading. • Denial of Service. • Unauthorized Access.
Challenges • Who Implements Security Policies in a Mobile environment. • Access control At What Granularity? • How Will Access control Policies be Implemented Uniformly
Background • Access Control Approaches For Mobile Code • Conditional Access Control • Domain & Type Enforcement. • Signed Code. • Using Certificates (SPKI, Attribute & Policy). • Bond Security • Pre-emptive Probe • Access Control Embedded In Communication Fabric • Bond Ticket.
Specific Objectives • An Access Control Model For Mobile Code Which Can Be Integrated Into Security Frameworks. • Milestones • Study & Identify different Access Control Models (DTE, Conditional Enforcement, SPKI based) Which Can Be Used. • Design Model For Integration With Bond Framework • Initial Ideas • Provide Independent Access Control Policy(agent & Host Policy) • Use Certificates To Encode Constraints(SPKI)
Literature • Providing Fine Grained Access Control For Java Programs – Raju Pandey & Brant Hashii http://www.ifs.uni-linz.ac.at/~ecoop/cd/papers/1628/16280449.pdf • A Distributed Access Control Model For Java – Refik Molva & Yves Roudier http://citeseer.nj.nec.com/cache/papers/cs/20254/http:zSzzSzwww.eurecom.frzSz~nsteamzSzPaperszSzesorics2000.pdf/a-distributed-access-control.pdf • Scalable Access Control For Distributed Object Systems – Daniel F Sterne et all….. http://www.usenix.org/publications/library/proceedings/sec99/full_papers/sterne/sterne.pdf
NIST Special Publication – Mobile agent security – Wayne Jensen & Tom Karygiannis http://csrc.nist.gov/mobileagents/publication/sp800-19.pdf • Bond System Security & Access Control Model – Ruibing Hao, K Jun & Dan C Marinescu http://citeseer.nj.nec.com/cache/papers/cs/19176/http:zSzzSzbond.cs.purdue.eduzSzpublicationszSzsecuritypdcn.pdf/hao98bond.pdf • SPKI – Yulian Wang http://www.hut.fi/~yuwang/publications/SPKI/SPKI.html • Privilege Management Scheme for Mobile Agents – W.A.Jensen http://www.acsac.org/2001/papers/121.pdf