Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects

2011 ◽  
Vol 48-49 ◽  
pp. 470-473
Author(s):  
Jun Ma ◽  
Zhi Ying Wang ◽  
Jiang Chun Ren ◽  
Jiang Jiang Wu ◽  
Yong Cheng ◽  
...  

The existence of trusted subjects is a major complication in implementing multilevel secure (MLS) systems. In MLS, trusted subjects are granted with privileges to perform operations possibly violating mandatory access control policies. It is difficult to prevent them from data leakage with out too strict confinement. This paper reconsiders the privilege from the view of sensitive data and presents a dynamic trusted domain (DTD) mechanism for trusted subjects. In DTD, a domain is associated with a special label structure (LabelVector) distinguishing security policies and builds an isolated environment based on virtualization for a certain trusted subject. The channel for the trusted subject to communicate with outsider is controlled by a trusted request decision maker (TRDM). Only the request satisfies the rules on domain label and security levels can be passed through.

2015 ◽  
Vol 18 (2) ◽  
pp. 1-25 ◽  
Author(s):  
Perry Alexander ◽  
Lee Pike ◽  
Peter Loscocco ◽  
George Coker

Author(s):  
Sandeep Lakaraju ◽  
Dianxiang Xu ◽  
Yong Wang

Healthcare information systems deal with sensitive data across complex workflows. They often allow various stakeholders from different environments to access data across organizational boundaries. This elevates the risk of exposing sensitive healthcare information to unauthorized personnel, leading ‘controlling access to resources' a major concern. To prevent unwanted access to sensitive information, healthcare organizations need to adopt effective workflows and access control mechanisms. Many healthcare organizations are not yet considering or do not know how to accommodate the ‘context' element as a crucial element in their workflows and access control policies. The authors envision the future of healthcare where ‘context' will be considered as a crucial element. They can accommodate context through a new element ‘environment' in workflows, and can accommodate context in policies through well-known attribute based access control mechanism (ABAC). This research mainly addresses these problems by proposing a model to integrate workflows and access control policies and thereby identifying workflow activities that are not being protected by access control policies and improving the workflow activities and/or existing access control policies using SARE (Subject, Action, Resource, and environment) elements.


Author(s):  
Sandeep Kumar Lakkaraju ◽  
Dianxiang Xu ◽  
Yong Wang

In a complex healthcare world, health information technology integrated workflows play a crucial role in improving healthcare workflow efficiency. Healthcare organizations often allow various stakeholders to access sensitive data across organizational boundaries. This increases the need to secure and restrict access to this sensitive data. In a complex environment like healthcare, the need for access to data highly depends on context, and many of the traditional access control mechanisms cannot accommodate “context.” In this process, there is need for healthcare organizations to look for more efficient access control mechanisms which work in accordance with workflows and accommodates “context” as a critical element. As a solution to this problem, this chapter presents a model to integrate workflows and access control policies and thereby identifying workflow activities that are not being protected by access control policies and improving the workflow activities and/or existing access control policies using SARE (subject, action, resource, and environment) elements.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Faouzi Jaïdi ◽  
Faten Labbene Ayachi ◽  
Adel Bouhoula

Substantial advances in Information and Communication Technologies (ICT) bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things,edge-fog-social-cloudcomputing, and big data analytics) is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare) and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our systemSVIRVROthat allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.


Sign in / Sign up

Export Citation Format

Share Document