Enabling Dynamic Security Policy in the Java Security Manager

Author(s):  
Fabien Autrel ◽  
Nora Cuppens-Boulahia ◽  
Frédéric Cuppens
Author(s):  
Mohamed Boucadair ◽  
Christian Jacquenet

Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.


2007 ◽  
Vol 3 (3) ◽  
pp. 195-210 ◽  
Author(s):  
Hervé Debar ◽  
Yohann Thomas ◽  
Frédéric Cuppens ◽  
Nora Cuppens-Boulahia

Author(s):  
Vu Ngoc Cham ◽  
Nguyen Tuan Anh

A federation is usually an alliance of organisations where users from one organisation are trusted to access resources in another organisation. The membership of federations is diverse and continually changing. Federations require distributed and dynamic security policy management to meet these challenges. We propose an authorisation policy management model, FABACD, which simplifies the management of collaborations between organisations. It allows distributed and trusted administrators to adjust the authorisation policies in a resource holding organisation, whilst ensuring that the latter remains in ultimate control. The net result is that a resource’s authorisation system is able to use user credentials built from preexisting attributes issued by any participating organisation, in order to determine a user’s access rights to the various resources, without requiring credentials to be issued that are based on federation specific attributes. The model significantly simplifies the authorisation management process for the resource holding organisation.


Sign in / Sign up

Export Citation Format

Share Document