Assured Counter-Terrorism Information Sharing Using Attribute Based Information Security (ABIS)

E. Yuan, G. Wenzel
{"title":"Assured Counter-Terrorism Information Sharing Using Attribute Based Information Security (ABIS)","authors":"E. Yuan, G. Wenzel","doi":"10.1109/AERO.2005.1559621","DOIUrl":null,"url":null,"abstract":"For counter-terrorism information sharing, just like for many other government and military operations in the post-9/11 world, the traditional mindset of \"need to know\" is being overtaken by the \"need to share\" among dynamic communities of interests (COIs). The problem with current IT environments and security mechanisms forces equal sharing of all information at the lowest common denominator, often requiring setting up new physical networks to protect the information boundaries, which is often time-consuming, costly, and not interoperable. The recent technology evolution towards service oriented architectures (SOAs) helps establish a loosely coupled, interoperable \"system of systems\" platform, however they also bring about their own security challenges. This paper outlines the inefficiency of conventional network boundary based, protection-oriented information security mechanisms as well as the new security challenges for the emerging SOA technologies, and proposes attribute based information security (ABIS) as a new approach for addressing these challenges. Center to this new approach is a generic attribute based access control (ABAC) model, which is based on subject, object, and environment attributes and supports both mandatory and discretionary access control needs. To realize the potentials of the ABAC model, the paper introduces a high level ABIS reference architecture, which reflects the proposed technical approaches to achieve an attribute-centric security methodology: First of all, to establish such an environment that facilitates the seamless flow of information between collaborating parties, the capability to provision and manage attributes for subjects and resources needs to be established. Secondly, attribute-binding mechanisms need to be in place to support the integrity and data assurance of the information objects. Next, the architecture should provide identification, authentication and authorization mechanisms based on the attributes. Building upon these tasks will lead to the establishment of \"trusted information domains\" within a shared network infrastructure, providing the ability to establish logical COIs seamlessly, created as needed or modified as policy dictates. The paper explores the possibilities of extending the ABAC model to across trust domains, allowing multiple levels of policy enforcement and policy federation","PeriodicalId":117223,"journal":{"name":"2005 IEEE Aerospace Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE Aerospace Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AERO.2005.1559621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

For counter-terrorism information sharing, just like for many other government and military operations in the post-9/11 world, the traditional mindset of "need to know" is being overtaken by the "need to share" among dynamic communities of interests (COIs). The problem with current IT environments and security mechanisms forces equal sharing of all information at the lowest common denominator, often requiring setting up new physical networks to protect the information boundaries, which is often time-consuming, costly, and not interoperable. The recent technology evolution towards service oriented architectures (SOAs) helps establish a loosely coupled, interoperable "system of systems" platform, however they also bring about their own security challenges. This paper outlines the inefficiency of conventional network boundary based, protection-oriented information security mechanisms as well as the new security challenges for the emerging SOA technologies, and proposes attribute based information security (ABIS) as a new approach for addressing these challenges. Center to this new approach is a generic attribute based access control (ABAC) model, which is based on subject, object, and environment attributes and supports both mandatory and discretionary access control needs. To realize the potentials of the ABAC model, the paper introduces a high level ABIS reference architecture, which reflects the proposed technical approaches to achieve an attribute-centric security methodology: First of all, to establish such an environment that facilitates the seamless flow of information between collaborating parties, the capability to provision and manage attributes for subjects and resources needs to be established. Secondly, attribute-binding mechanisms need to be in place to support the integrity and data assurance of the information objects. Next, the architecture should provide identification, authentication and authorization mechanisms based on the attributes. Building upon these tasks will lead to the establishment of "trusted information domains" within a shared network infrastructure, providing the ability to establish logical COIs seamlessly, created as needed or modified as policy dictates. The paper explores the possibilities of extending the ABAC model to across trust domains, allowing multiple levels of policy enforcement and policy federation
基于属性的信息安全(ABIS)确保反恐信息共享
就反恐信息共享而言,就像9/11后世界的许多其他政府和军事行动一样,在充满活力的利益共同体(coi)之间,传统的“需要知道”心态正在被“需要分享”所取代。当前IT环境和安全机制的问题迫使以最低公分母平等地共享所有信息,通常需要建立新的物理网络来保护信息边界,这通常是耗时、昂贵且不可互操作的。最近向面向服务的体系结构(soa)发展的技术有助于建立松散耦合、可互操作的“系统的系统”平台,但是它们也带来了自身的安全挑战。本文概述了传统的基于网络边界的、面向保护的信息安全机制的低效率,以及新兴SOA技术面临的新的安全挑战,并提出了基于属性的信息安全(ABIS)作为解决这些挑战的新方法。这种新方法的核心是基于通用属性的访问控制(ABAC)模型,该模型基于主题、对象和环境属性,并支持强制和可自由选择的访问控制需求。为了实现ABAC模型的潜力,本文介绍了一个高层次的ABIS参考体系结构,该体系结构反映了实现以属性为中心的安全方法论的技术方法:首先,要建立这样一个环境,促进协作各方之间的信息无缝流动,需要建立主体和资源的属性提供和管理能力。其次,需要使用属性绑定机制来支持信息对象的完整性和数据保证。接下来,体系结构应该提供基于属性的标识、身份验证和授权机制。在这些任务的基础上构建将导致在共享网络基础设施中建立“可信信息域”,提供无缝地建立逻辑coi的能力,根据需要创建或根据策略指示修改。本文探讨了将ABAC模型扩展到跨信任域的可能性,从而允许多级策略实施和策略联合
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信