可变威胁环境下的多域信任管理——以用户为中心的模型

M. Burmester, P. Das, Martin Edwards, Alec Yasinsac
{"title":"可变威胁环境下的多域信任管理——以用户为中心的模型","authors":"M. Burmester, P. Das, Martin Edwards, Alec Yasinsac","doi":"10.1109/MILCOM.2009.5379712","DOIUrl":null,"url":null,"abstract":"Trust Management (TM) systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper we present a user-centric view to address trust management as it impacts the unanticipated user and/or user behavior for multi-domain applications. This protection can be tuned to deal with users who may be responsible for an elevated threat level, and builds upon a resource-centric architecture. Our model is suitable for variable-threat environments and allows for temporary adjustments of trust levels. The expectation is to enable a Trust Management Agent to determine appropriateness of the unanticipated user or behavior, and reverse restrictions without compromising actions that took place during such periods —we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and is appropriate for today's military and intelligence community coalitions as they execute their particular missions in the Global War on Terrorism.","PeriodicalId":338641,"journal":{"name":"MILCOM 2009 - 2009 IEEE Military Communications Conference","volume":"99 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi-domain Trust Management in variable-threat environments - a user-centric model\",\"authors\":\"M. Burmester, P. Das, Martin Edwards, Alec Yasinsac\",\"doi\":\"10.1109/MILCOM.2009.5379712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Trust Management (TM) systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper we present a user-centric view to address trust management as it impacts the unanticipated user and/or user behavior for multi-domain applications. This protection can be tuned to deal with users who may be responsible for an elevated threat level, and builds upon a resource-centric architecture. Our model is suitable for variable-threat environments and allows for temporary adjustments of trust levels. The expectation is to enable a Trust Management Agent to determine appropriateness of the unanticipated user or behavior, and reverse restrictions without compromising actions that took place during such periods —we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and is appropriate for today's military and intelligence community coalitions as they execute their particular missions in the Global War on Terrorism.\",\"PeriodicalId\":338641,\"journal\":{\"name\":\"MILCOM 2009 - 2009 IEEE Military Communications Conference\",\"volume\":\"99 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-10-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"MILCOM 2009 - 2009 IEEE Military Communications Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MILCOM.2009.5379712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"MILCOM 2009 - 2009 IEEE Military Communications Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MILCOM.2009.5379712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

信任管理(TM)系统是信任基础设施,支持对分散环境中的安全关键操作进行授权。在本文中,我们提出了一个以用户为中心的观点来解决信任管理,因为它会影响多域应用程序的意外用户和/或用户行为。可以对这种保护进行调优,以处理可能对提高威胁级别负责的用户,并构建在以资源为中心的体系结构之上。我们的模型适用于可变威胁环境,并允许临时调整信任级别。期望是使信任管理代理能够确定未预期的用户或行为的适当性,并在不影响在此期间发生的操作的情况下撤销限制-我们称之为回滚访问。我们认为,回滚访问能力是安全关键应用程序的基本特征,适用于当今的军事和情报社区联盟,因为他们在全球反恐战争中执行特定任务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Multi-domain Trust Management in variable-threat environments - a user-centric model
Trust Management (TM) systems are trust infrastructures that support authorization for security-critical actions in decentralized environments. In this paper we present a user-centric view to address trust management as it impacts the unanticipated user and/or user behavior for multi-domain applications. This protection can be tuned to deal with users who may be responsible for an elevated threat level, and builds upon a resource-centric architecture. Our model is suitable for variable-threat environments and allows for temporary adjustments of trust levels. The expectation is to enable a Trust Management Agent to determine appropriateness of the unanticipated user or behavior, and reverse restrictions without compromising actions that took place during such periods —we term this, rollback-access. We argue that a rollback-access capability is an essential feature for security-critical applications, and is appropriate for today's military and intelligence community coalitions as they execute their particular missions in the Global War on Terrorism.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信