next up previous
Next: Introduction and Motivation

The Specification and Enforcement of Advanced Security Policies

Tatyana Ryutov and Clifford Neuman
Information Sciences Institute
University of Southern California
{tryutov, bcn}@isi.edu

Abstract:

In a distributed multi-user environment, the security policy must not only specify legitimate user privileges but also aid in the detection of the abuse of the privileges and adapt to perceived system threat conditions.

This paper advocates extending authorization policy evaluation mechanisms with a means for generating audit data allowing immediate notification of suspicious application level activity. It additionally suggests that the evaluation of the policies themselves adapt to perceived network threat conditions, possibly affected by the receipt of such audit data by other processes.

Such advanced policies assist in detecting and responding to intrusion and misuse and they allow more efficient utilization of security services, such as authentication, audit, and notification.

We present an authorization framework, which enables the representation and enforcement of advanced security policies. Our approach is based on expanding the policy evaluation mechanism with the ability to generate real time actions, such as checking the current system threat level and sending a notification.




next up previous
Next: Introduction and Motivation
Tatyana Ryutov 2002-06-25