共查询到20条相似文献,搜索用时 31 毫秒
1.
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views , the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers . An attribute-based dynamic access control model is presented to detail the relationships among subjects , objects , roles , attributes , context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 相似文献
2.
Traffic adaptive WDM networks: a study of reconfiguration issues 总被引:1,自引:0,他引:1
This paper studies the issues arising in the reconfiguration phase of broadcast optical networks. Although the ability to dynamically optimize the network under changing traffic conditions has been recognized as one of the key features of multi-wavelength optical networks, this is the first in-depth study of the tradeoffs involved in carrying out the reconfiguration process. We develop and compare reconfiguration policies to determine when to reconfigure the network, and we present an approach to carry out the network transition by describing a class of strategies that determine how to retune the optical transceivers. We identify the degree of load balancing and the number of retunings as two important, albeit conflicting, objectives in the design of reconfiguration policies, naturally leading to a formulation of the problem as a Markovian decision process. Consequently, we develop a systematic and flexible framework in which to view and contrast reconfiguration policies. We show how an appropriate selection of reward and cost functions can be used to achieve the desired balance among various performance criteria of interest. We conduct a comprehensive evaluation of reconfiguration policies and retuning strategies and demonstrate the benefits of reconfiguration through both analytical and simulation results. The result of our work is a set of practical techniques for managing the network transition phase that can be directly applied to networks of large size. Although our work is in the context of broadcast networks, the results can be applied to any wavelength-division multiplexing network where it is necessary to multiplex traffic from a large user population into a number of wavelengths 相似文献
3.
4.
Secure quality of service handling: SQoSH 总被引:1,自引:0,他引:1
Alexander D.S. Arbaugh W.A. Keromytis A.D. Muir S. Smith J.M. 《Communications Magazine, IEEE》2000,38(4):106-112
Proposals for programmable network infrastructures, such as active networks and open signaling, provide programmers with access to network resources and data structures. The motivation for providing these interfaces is accelerated introduction of new services, but exposure of the interfaces introduces many new security risks. We describe some of the security issues raised by active networks. We then describe our secure active network environment (SANE) architecture. SANE was designed as a security infrastructure for active networks, and was implemented in the SwitchWare architecture. SANE restricts the actions that loaded modules can perform by restricting the resources that can be named; this is further extended to remote invocation by means of cryptographic credentials. SANE can be extended to support restricted control of quality of service in a programmable network element. The Piglet lightweight device kernel provides a “virtual clock” type of scheduling discipline for network traffic, and exports several tuning knobs with which the clock can be adjusted. The ALIEN active loader provides safe access to these knobs to modules that operate on the network element. Thus, the proposed SQoSH architecture is able to provide safe, secure access to network resources, while allowing these resources to be managed by end users needing customized networking services. A desirable consequence of SQoSH's integration of access control and resource control is that a large class of denial-of-service attacks, unaddressed solely with access control and cryptographic protocols, can now be prevented 相似文献
5.
Gianluca Dini Ida Maria Savino 《International Journal of Wireless Information Networks》2010,17(1-2):11-25
Nowadays, networked embedded systems (NESs) are required to be reconfigurable in order to be customizable to different operating environments and/or adaptable to changes in operating environment. However, reconfigurability acts against security as it introduces new sources of vulnerability. In this paper, we propose a security architecture that integrates, enriches and extends a component-based middleware layer with abstractions and mechanisms for secure reconfiguration and secure communication. The architecture provides a secure communication service that enforces application-specific fine-grained security policy. Furthermore, in order to support secure reconfiguration at the middleware level, the architecture provides a basic mechanism for authenticated downloading from a remote source. Finally, the architecture provides a rekeying service that performs key distribution and revocation. The architecture provides the services as a collection of middleware components that an application developer can instantiate according to the application requirements and constraints. The security architecture extends the middleware by exploiting the decoupling and encapsulation capabilities provided by components. It follows that the architecture results itself reconfigurable and can span heterogeneous devices. The security architecture has been implemented for different platforms including low-end, resource-poor ones such as Tmote Sky sensor devices. 相似文献
6.
In future wireless networks, mobility-related services, such as candidate access router discovery (CARD), will play a significant role in realizing truly ubiquitous, seamless connectivity. In order for these services to be realized, however, their particular security concerns must be addressed. Moreover, the security solution must be flexible and highly configurable in order to meet the demands of inter-domain roaming agreements. In this paper, we explore a number of alternatives and present a general architecture, iARSec, that provides both authentication as well as explicit authorization for services running between neighboring access routers. 相似文献
7.
Neeli R. Prasad Mahbubul Alam Marina Ruggieri 《Wireless Personal Communications》2004,29(3-4):205-219
Security and privacy architecture for various access networks have often been considered on the upper service layers in the form of application and transport security and from lower layers in the form of security over wireless networks. Today there is no trust relationship between the stakeholders of different access network types for e.g. wireless mesh network, wireless PAN, wireless LAN, cellular network, satellite etc. and each have their own security mechanism. What is common for these access networks is the networking layer which is IP based. In order to provide seamless service across these heterogeneous access networks there must be a trust relationship among the stakeholders for authentication, authorization, accounting and billing of end user. However, what is still missing is a general solution which is both adaptable to the network types and conditions and also takes into account end system capabilities as well as enabling inter-domain AAA negotiation. This paper proposes a light-weight AAA infrastructure providing continuous, on-demand, end-to-end security in heterogeneous networks. 相似文献
8.
The mission of operational support systems (OSS) is to run and manage the daily operations of a company. It is very important that the OSS exhibits great flexibility in adjusting its behaviour to ad hoc circumstances and in evolving as dictated by emerging changes. Contemporary advances in the area of software engineering, involving component-based frameworks, service-oriented architectures and Web Services, considerably facilitate the development of flexible component-based OSS. However, unless business rules, constraints and processes are disentangled from the OSS and become separately managed entities, every single change on them would require direct modifications within the system’s software, a fact that still limits the flexibility. It is the primary aim of this paper to examine the role that policies can play in delivering highly adaptable, configurable and flexible component-based new generation OSS (NGOSS). In order to ensure the highest degree of flexibility for NGOSS, the paper makes a threefold contribution. Firstly, a generic high-level model is introduced encompassing constructs that include policies capable of specifying NGOSS components in a technology-neutral way. The model complies with most of the TeleManagement Forum’s NGOSS principles. Secondly, we show how policies can be specified and used to flexibly configure component behaviour. Thirdly, the design of a component container is presented, which provides all necessary tools to facilitate the use of policies and aids the software materialisation of a policy-enabled interface to OSS components. An implementation of the container and an example scenario of its use is then shown. 相似文献
9.
Blanquer I. Hernandez V. Segrelles D. Torres E. 《IEEE transactions on information technology in biomedicine》2009,13(1):16-24
The use of data Grids for sharing relevant data has proven to be successful in many research disciplines. However, the use of these environments when personal data are involved (such as in health) is reduced due to its lack of trust. There are many approaches that provide encrypted storages and key shares to prevent the access from unauthorized users. However, these approaches are additional layers that should be managed along with the authorization policies. We present in this paper a privacy-enhancing technique that uses encryption and relates to the structure of the data and their organizations, providing a natural way to propagate authorization and also a framework that fits with many use cases. The paper describes the architecture and processes, and also shows results obtained in a medical imaging platform. 相似文献
10.
Yi Ping Zhong Yiping Zhang Shiyong 《电子科学学刊(英文版)》2006,23(3):417-422
This paper focuses on investigating immunological principles in designing a multi-agent security architecture for intrusion detection and response in mobile ad hoc networks. In this approach, the immunity-based agents monitor the situation in the network. These agents can take appropriate actions according to the underlying security policies. Specifically, their activities are coordinated in a hierarchical fashion while sensing, communicating, decision and generating responses. Such an agent can learn and adapt to its environment dynamically and can detect both known and unknown intrusions. The proposed intrusion detection architecture is designed to be flexible, extendible, and adaptable that can perform real-time monitoring. This paper provides the conceptual view and a general framework of the proposed system. In the end, the architecture is illustrated by an example to show it can prevent the attack efficiently. 相似文献
11.
现有的授权方式难以满足多种应用要求。提出一种基于策略的RBAC统一授权模型,并给出其实现方案。该模型以策略为基本构成要素,实现了根据多种属性的角色自动授予、角色冲突检测等功能。利用该模型能够以细粒度、灵活及与具体应用无关的方式授予用户权限,解决了大规模、海量用户系统难以自动授权的问题。基于该模型实现的统一授权与访问系统验汪了模型的有效性,可用在多种类型的应用系统上。 相似文献
12.
Bart Lannoo Goutam Das Abhishek Dixit Didier Colle Mario Pickavet Piet Demeester 《Telecommunication Systems》2013,54(2):147-165
Different hybrid WDM/TDM PON architectures are compared in terms of flexibility, simplicity (affecting the cost), insertion loss (affecting the reach) and security. Special attention is given to the flexibility aspect in next generation optical access networks by designing different architectures with a different degree of flexibility, which are able to cope with different ranges of dynamic bandwidth allocation (DBA) possibilities. This paper assesses the degree of architectural flexibility needed to deal with some important flexibility advantages. It is shown that mostly a partially flexible architecture fulfils the needs. The architectures are then further evaluated from a cost and reach perspective. In this way, we provide a complete comparison considering all the key aspects of access network design. It is shown that a hybrid WDM/TDM PON with a partially flexible architecture in the first remote node can be an interesting candidate for next-generation optical access networks. 相似文献
13.
Chuan-Ching Sue 《Photonic Network Communications》2007,14(3):327-335
This article studies the issues arising when reconfiguring coded-WDM networks to provide protection against eavesdropping.
Although the ability to reconfigure coded-WDM PONs dynamically has been recognized as an effective means of improving the
security of OCDMA networks, this article provides the first in-depth study of the tradeoffs involved in carrying out this
reconfiguration process. The article commences by showing that the degree of confidentiality and the traffic loss are two
important, but conflicting, objectives in the design of reconfiguration policies. The reconfiguration problem is then formulated
as a Markovian decision process (MDP). The results obtained from MDP theory are applied to establish optimal reconfiguration
policies for coded-WDM networks with various system parameters. Finally, the advantages of the optimal reconfiguration policies
over a class of threshold-based policies are illustrated through simulation results. 相似文献
14.
15.
16.
17.
Mobile systems are evolving into data centric, packet switched,multiacess networks. New types of security threats are emerging in thesenew networks. From the user point of view a seamless solution for thesethreats is required. This paper presents a vision of network convergenceand its implications to authentication and authorization solutions.Security requirements are discussed and current authentication solutionsin GSM, UMTS and operator wireless local area networks (OWLAN) areintroduced. All-IP multimedia session security is discussed.Implications of AdHoc network architecture into security requirement arediscussed. 相似文献
18.
提出了一种第三方的授权服务模型,对现存的信任协商系统起到支撑作用.模型作为一个授权代理,在实体使用信任协商确定一个适当的资源访问策略后,可以在一个开放的系统中发布访问资源的令牌.模型的体系结构设计允许集成新的信任应用程序,也可以间接集成现存传统的应用程序.讨论模型、模型使用的通信协议的设计和实现,以及它的性能. 相似文献
19.
Service-based architecture (SBA) is a profound advancement in the novel 5G Core network (5GC). Existing studies show that SBA can benefit from cloud computing to achieve extensibility, modularity, reusability, and openness. It also brings security problems (e.g., hypervisor hijacking, and malware injection). To provide secure 5G services, we propose a service-based cloud architecture called Mimicloud for 5GC based on dynamic and heterogeneous techniques. Mimicloud provides flexible reconfiguration mechanisms to protect containers and eliminate all attack knowledge obtained from adversaries. We use multiple containers to execute crucial services and ensure security with crosscheck. Mimicloud employs heterogeneous components to prevent multiple containers from being breached through the same vulnerabilities. Experimental results show that Mimicloud can effectively strengthen the security of the 5GC. The performance overhead is analyzed in order to demonstrate its scalability. 相似文献
20.
Terminal-centric view of software. reconfigurable system architecture and enabling components and technologies 总被引:1,自引:0,他引:1
《Communications Magazine, IEEE》2004,42(5):100-110
Reconfigurable radio in Europe is rapidly gaining momentum and becoming a key enabler for realizing the vision of being optimally connected anywhere, anytime. At the center of this exciting technology is the reconfigurable terminal that will move across different radio access networks, adapting at every instant to an optimum mode of operation. This will require coordinated reconfiguration management support from both the terminal and the network, but the terminal will inherit a significant part of this intelligence. This article focuses on a novel reconfigurable terminal architecture that advances the state of the art and encompasses the overall protocol stack from the physical to application layer in IP-based radio access networks. The proposed architecture is composed of a terminal reconfiguration management part and enabling middleware technologies like the complementary Distributed Processing Environment and agent platforms, flexible protocol stacks that can flexibly be interchanged to support different wireless technologies and associated mechanisms, and finally, object-oriented reconfigurable RF and baseband components. The work presented in this article is conducted in the context of the IST projects SCOUT (www.ist-scout.org) and TRUST (www4.in.tum.de/-scout/trust webpage/spl I.bar/src/ trust frameset.html) of the European 5th Framework Program. 相似文献