Network Policy Enforcement Using Transactions: The NEUTRON Approach.

SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies Indianapolis Indiana USA June, 2018(2018)

引用 5|浏览43
暂无评分
摘要
We propose a tool to capture applications requirements with respect to the enforcement of network security policies in an object-oriented design language. Once a design captures clear, concise, easily understood network requirements new technologies become possible, including network transactions and user-driven policies to remove rarely used network permissions until needed, creating a least privilege in time policy. Existing security enforcement policies represent a model of all allowable behavior. Only modeling allowable behavior requires that any entity that may need a permission, be granted it permanently. Refining the modeling to distinguish between common behavior and rare behavior will increase security. The increased security comes with costs, such as requiring users to strongly authenticate more often. This paper discusses those costs and the complexity of increasing security enforcement models.
更多
查看译文
关键词
security enforcement policy,network transactions,user-driven policy,network security,policy design
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要