Skip to main content

A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment

  • Conference paper
Kommunikation in Verteilten Systemen (KiVS)

Part of the book series: Informatik aktuell ((INFORMAT))

  • 159 Accesses

Abstract

To provide security for active networking nodes with respect to availability and controlled access the introduction of an access control mechanism and consequently a policy framework are mandatory. We follow the approach of a scenario-tailored runtime supervision of the service. During the development of the access control mechanism we strongly focused on keeping the mechanism as efficient as possible and to realize a modular design which allows to dynamically upgrade and configure the mechanism making use of the active networking technology itself while at the same time ensuring that mandatory security checks cannot be circumvented. Each service has to pass initial checks before it could be executed on an active node. Furthermore, also service-specific adaptive criterions could be included into the initial check. This paper discusses the corresponding flexible and dynamic access control policy framework and we also present results achieved with a first prototype realized for the active networking environment AMnet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

Bibliography

  1. Guy Edjlali, Anurag Acharya, and Vipin Chaudhary. History-based access control for mobile code. In ACM Conference on Computer and Communications Security, pages 38–48, 1998.

    Google Scholar 

  2. David Evans and Andrew Twyman. Flexible policy-directed code safety. In IEEE Symposium on Security and Privacy, pages 32–45, 1999.

    Google Scholar 

  3. S. Garfinkel G. Spafford. Practical UNIX & Internet Security. O’Reilly, 1996.

    Google Scholar 

  4. Li Gong. Java security: present and near future. IEEE Micro, 17(3): 14–19, 1997.

    Article  Google Scholar 

  5. Till Harbaum, Anke Speer, Ralph Wittmann, and Martina Zitterbart. Amnet: Efficient heterogeneous group communication through rapid service creation.

    Google Scholar 

  6. John J. Hartman, Peter A. Bigot, Patrick Bridges, Brady Montz, Rob Piltz, Oliver Spatscheck, Todd A. Proebsting, Larry L. Peterson, and Andy Bavier. Joust: A platform for liquid software. Computer, 32(4):50–56, 1999.

    Article  Google Scholar 

  7. A. Hess, M. Schoeller, G. Schaefer, M. Zitterbart, and A. Wolisz. A dynamic and flexible access control and resource monitoring mechanism for active nodes. In Proc. of OpenArch 2002, Short Paper Session, New York, USA, June 2002. IEEE.

    Google Scholar 

  8. Michael W. Hicks, Jonathan T. Moore, D. Scott Alexander, Carl A. Gunter, and Scott Nettles. PLANet: An active internetwork. In INFOCOM (3), pages 1124–1133, 1999.

    Google Scholar 

  9. A. J. Kfoury, R. N. Moll, and M. A. Arbib. A Programming Approach to Com-putability. Springer, Berlin, 1986.

    Google Scholar 

  10. Z. Liu, R. Campbell, and M. Mickunas. Securing the node of an active network, 2000.

    Google Scholar 

  11. N. V. Mehta and K. R Sollins. Expanding and extending the security features of Java. In 7th Usenix Security Symposium, pages 159–172, 1998.

    Google Scholar 

  12. David Mosberger and Larry L. Peterson. Making paths explicit in the scout operating system. In Operating Systems Design and Implementation, pages 153–167, 1996.

    Google Scholar 

  13. R. H. Campbell P. Naldurg and M. D. Mickunas. Developing dynamic security policies. 2002.

    Google Scholar 

  14. Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278–1308, September 1975.

    Article  Google Scholar 

  15. Fred B. Schneider. Enforceable security policies. Information and System Security, 3(1):30–50, 2000.

    Article  Google Scholar 

  16. Dan S. Wallach, Dirk Balfanz, Drew Dean, and Edward W. Feiten. Extensible security architectures for Java. In 16th Symposium on Operating Systems Principles, pages 116–128,1997.

    Google Scholar 

  17. Ralph Wittmann and Martina Zitterbart. AMnet: Active multicasting network. In COST 237 Workshop, pages 154–164, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hess, A., Schäfer, G. (2003). A Flexible and Dynamic Access Control Policy Framework for an Active Networking Environment. In: Irmscher, K., Fähnrich, KP. (eds) Kommunikation in Verteilten Systemen (KiVS). Informatik aktuell. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55569-5_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-55569-5_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00365-6

  • Online ISBN: 978-3-642-55569-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics