M. Idrees, S. Ayed, N. Cuppens-Boulahia, F. Cuppens
{"title":"使用方面的动态安全策略实施和适应","authors":"M. Idrees, S. Ayed, N. Cuppens-Boulahia, F. Cuppens","doi":"10.1109/Trustcom.2015.533","DOIUrl":null,"url":null,"abstract":"Enforcing access and usage control requirements, like permissions and obligations, to govern distributed systems is a complex and error-prone task and notably hard to implement. In this paper, we claim that various enforcement modes are needed to obtain an overall consistent enforcement of access and usage control requirements. We build our approach based on the aspect oriented concepts to dynamically enforce security policies. We also describe how this approach can be supported through the deployment phase of security aspects across the system.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"86 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Dynamic Security Policies Enforcement and Adaptation Using Aspects\",\"authors\":\"M. Idrees, S. Ayed, N. Cuppens-Boulahia, F. Cuppens\",\"doi\":\"10.1109/Trustcom.2015.533\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Enforcing access and usage control requirements, like permissions and obligations, to govern distributed systems is a complex and error-prone task and notably hard to implement. In this paper, we claim that various enforcement modes are needed to obtain an overall consistent enforcement of access and usage control requirements. We build our approach based on the aspect oriented concepts to dynamically enforce security policies. We also describe how this approach can be supported through the deployment phase of security aspects across the system.\",\"PeriodicalId\":277092,\"journal\":{\"name\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"volume\":\"86 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Trustcom.2015.533\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Security Policies Enforcement and Adaptation Using Aspects
Enforcing access and usage control requirements, like permissions and obligations, to govern distributed systems is a complex and error-prone task and notably hard to implement. In this paper, we claim that various enforcement modes are needed to obtain an overall consistent enforcement of access and usage control requirements. We build our approach based on the aspect oriented concepts to dynamically enforce security policies. We also describe how this approach can be supported through the deployment phase of security aspects across the system.