...
首页> 外文期刊>International Journal of Innovative Computing Information and Control >DYNAMIC REMOTE ATTESTATION THROUGH BEHAVIOR MEASUREMENT AND VERIFICATION
【24h】

DYNAMIC REMOTE ATTESTATION THROUGH BEHAVIOR MEASUREMENT AND VERIFICATION

机译:通过行为测量和验证进行的动态远距干扰

获取原文
获取原文并翻译 | 示例
           

摘要

The interdisciplinary nature of information handled by the enterprise information systems and their interaction with domains beyond organizational boundaries necessitates the incorporation of comprehensive security mechanisms within such systems, enabling them to manage access control requirements in a flexible manner, making sure that the data assets of the organization and its customers are safe not only within the organization but also outside its boundaries. Therefore, state of the systems outside the direct control of the organization must be verified before granting access to sensitive data so as to make sure that such client systems are benign and that the resource will be used according to expectations. UCON provides control over access to information and its usage at a fine grained level which is not possible with traditional access control, while trusted computing technologies in general and remote attestation in particular can be used for the verification of the client systems along with the protection of the host systems from rootkits and other security attacks. Remote attestation is an important characteristic of trusted computing technology which provides reliable evidence that a trusted environment actually exists. Existing approaches for the realization of remote attestation measure the trustworthiness of a target platform from its binaries, configurations, properties or security policies. All these approaches are low-level attestation techniques only, and none of them define what a trusted behavior actually is and how to specify it. In this paper1, we present a novel approach to verify the trustworthiness of a platform whereby trustworthiness of the platform is associated with the behavior of a policy model. In our approach, the behavior of a policy model is attested rather than a software or hardware platform. Thus, the attestation feature is not tied to a specific software or hardware platform, or to a particular remote attestation technique, or to an individual type of security policy. We select usage control (UCON) as our target policy model in the context of a health care enterprise information system. We propose a framework to identify, specify and attest different behaviors of UCON. We discuss the prototype implementation for the realization of our approach.
机译:企业信息系统处理的信息具有跨学科性质,并且它们与组织边界之外的域进行交互,因此有必要在此类系统中纳入全面的安全机制,从而使他们能够灵活地管理访问控制要求,从而确保访问服务器的数据资产组织及其客户不仅在组织内部而且在组织边界之外都是安全的。因此,在授予对敏感数据的访问权限之前,必须验证组织直接控制范围之外的系统状态,以确保此类客户端系统是良性的,并且将根据预期使用资源。 UCON可以细粒度地提供对信息访问及其使用的控制,这是传统访问控制所无法实现的,而受信任的计算技术(特别是远程证明)尤其可以用于验证客户端系统以及保护用户身份。主机系统免受rootkit和其他安全攻击。远程证明是可信计算技术的重要特征,它提供了可靠环境确实存在的可靠证据。用于实现远程证明的现有方法根据目标平台的二进制文件,配置,属性或安全策略来衡量其可信度。所有这些方法仅是低级证明技术,它们都没有定义实际的可信行为以及如何指定可信行为。在本文1中,我们提出了一种新颖的方法来验证平台的可信度,其中平台的可信度与策略模型的行为相关联。在我们的方法中,将证明策略模型的行为,而不是软件或硬件平台。因此,证明功能不依赖于特定的软件或硬件平台,也不依赖于特定的远程证明技术,也不依赖于单个类型的安全策略。在医疗保健企业信息系统中,我们选择使用控制(UCON)作为我们的目标策略模型。我们提出了一个框架来识别,指定和证明UCON的不同行为。我们讨论实现该方法的原型实现。

著录项

  • 来源
  • 作者单位

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Huawei Research Center at Santa Clara, CA, USA Xinwen.;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    FAST-National University of Computer and Emerging Sciences, Islamabad, Pakistan;

    School of Electrical Engineering and Computer Science, NUST, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

    Security Engineering Research Group, Institute of Management Sciences 1-A, E-5, Phase VII, Hayatabad, Peshawar, Pakistan;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    security; trusted computing; remote attestation; behavioral attestation; usage control;

    机译:安全;可信计算;远程证明;行为证明;使用控制;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号