Flexible Regulation of Virtual Enterprises Naftaly Minsky Rutgers University Joint work with Xuhui Ao.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Distributed Scheduling in Supply Chain Management Emrah Zarifoğlu
1 Towards Decentralized and Secure Electronic Marketplace Yingying Chen, Naftaly Minsky, Constantin Serban, and Wenxuan Zhang Dept of Computer Science.
Overview of OASIS SOA Reference Architecture Foundation (SOA-RAF)
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Naftaly Minsky Rutgers University Law-Governed Multi-Agent Systems: From Anarchy to Order “Law is order, and good law is good order” Aristotle, Politics.
A Dependable Auction System: Architecture and an Implementation Framework
Understanding Active Directory
Interoperation Between a Conventional PKI and an ID-Based Infrastructure Geraint Price Royal Holloway University of London joint work with Chris Mitchell.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Naftaly Minsky Rutgers University Law-Governed Interaction: a Decentralized Access-Control Mechanism.
Naftaly Minsky Rutgers University Preventing Theft By Keeping Good Company.
Trust and Grid Computing Systems Presented By: Woodas Lai.
1 Regulating the Synchronous Interaction of Web-Services Constantin Serban Department of Computer Science Rutgers University.
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Chapter 6: Integrity Policies Overview Requirements Biba’s models Clark-Wilson model Introduction to Computer Security ©2004 Matt Bishop.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
1/25/2000 Active Names: Flexible Location and Transport of Wide-Area Resources Luis Rivera.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Understanding and Leveraging MU2 Optional Transports Paul M. Tuten, PhD Senior Consultant, ONC Leader, Implementation Geographies Workgroup, Direct Project.
A centralized system.  Active Directory is Microsoft's trademarked directory service, an integral part of the Windows architecture. Like other directory.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Managing Service Metadata as Context The 2005 Istanbul International Computational Science & Engineering Conference (ICCSE2005) Mehmet S. Aktas
Designing Active Directory for Security
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Naftaly Minsky Rutgers University Imposing Order Over Irregular & Open Systems.
Peer to Peer Research survey TingYang Chang. Intro. Of P2P Computers of the system was known as peers which sharing data files with each other. Build.
Governance in Multi-Agent Systems Using Testimonies to Enforce the Behavior of Agents Fernanda Duran, Viviane Torres da Silva.
Transboundary Trust Space September 19, 2012 Development trends of legal acts in forming valid transboundary electronic interaction Alexander Sazonov Regional.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
Standards in the world of E-business Harm Jan van Burg Ministry of Finance The Netherlands UN/CEFACT Vice Chair for international cooperation.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
The Anatomy of the Grid Mahdi Hamzeh Fall 2005 Class Presentation for the Parallel Processing Course. All figures and data are copyrights of their respective.
McGraw-Hill/Irwin Strategic Management, 10/e Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved. Logistyka wirtualna Element 9.
ESnet PKI Developed for the DOE Science Grid and SciDAC.
Distributed Computing Systems CSCI 4780/6780. Distributed System A distributed system is: A collection of independent computers that appears to its users.
Distributed Computing Systems CSCI 4780/6780. Geographical Scalability Challenges Synchronous communication –Waiting for a reply does not scale well!!
Deliberative, Pre-decisional – Do Not Quote, Cite or Distribute 1 Chesapeake Bay Water Quality Trading.
Semantic based P2P System for local e-Government Fernando Ortiz-Rodriguez 1, Raúl Palma de León 2 and Boris Villazón-Terrazas 2 1 1Universidad Tamaulipeca.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Integrity Policies Murat Kantarcioglu.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
An Event-Driven High Level Model for the Specification of Laws in Open Multi-Agent Systems Rodrigo Paes
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
第 1 讲 分布式系统概述 §1.1 分布式系统的定义 §1.2 分布式系统分类 §1.3 分布式系统体系结构.
E-Science Security Roadmap Grid Security Task Force From original presentation by Howard Chivers, University of York Brief content:  Seek feedback on.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
© 2015 Open Grid Forum ETSI CSC activities Wolfgang Ziegler Area Director Applications, OGF Fraunhofer Institute SCAI Open Grid Forum 44, May 21-22, 2015.
EGI-InSPIRE RI EGI-InSPIRE EGI-InSPIRE RI Evolution of AAI for e- infrastructures Peter Solagna Senior Operations Manager.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Models of the OASIS SOA Reference Architecture Foundation Ken Laskey Chair, SOA Reference Model Technical Committee 20 March 2013.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Naftaly Minsky Computer Science Department Rutgers University Reducing Spam by Not Sending it or Can the Spam “Arms Race” be Won?
Bob Jones EGEE Technical Director
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Intrusion Tolerance for NEST
Organization Structure and Management Systems
Internal control - the IA perspective
The Globus Toolkit™: Information Services
12th IEEE PES PowerTech Conference
Dashboard eHealth services: actual mockup
Enterprise Integration
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Flexible Regulation of Virtual Enterprises Naftaly Minsky Rutgers University Joint work with Xuhui Ao

2 N. Minsky: DIMACS, e-commerce May05 Outline  The challenges to access control posed by e-commerce.  Regulation of virtual enterprises — a case study.  The law-governed interaction (LGI) mechanism, and how it meets the challenges to access control.  Conclusion

3 N. Minsky: DIMACS, e-commerce May05 The Challenges to AC  The distributed and open nature of E-commerce, and its scale.  PKI facilitates scalability;  but enforcement of AC policies is still done largely in a centralized fashion, making it hard to scale.  The need for more sophisticated policies, e.g.,  Stateful policies, sensitive to the history of interaction, like budgetary control.  Policies that mandate extra actions, like state change, or auditing.

4 N. Minsky: DIMACS, e-commerce May05 The Challenges to AC (cont)  The need for communal (rather than “server- centric”) policies, such as:  An enterprise-wide policy governing a set of servers.  Decentralized electronic marketplace.  B2B commerce, and supply chains.  The need for interoperation between different policies, and for hierarchical organization of policies.  All these challenges need to be met via a single scalable mechanism—for specifying policies, and for enforcing them.

5 N. Minsky: DIMACS, e-commerce May05 Governance of Virtual Enterprise (a Case Study)  Consider a coalition C of enterprises {E 1,..., E n }, governed by a coalition-policy P C ---where each E i is governed by its own internal-policy P i.  As in: virtual enterprises, supply chains, grid computing, etc. E3E3 E2E2 E1E1 P2P2 P1P1 P3P3 PCPC

6 N. Minsky: DIMACS, e-commerce May05 Policies Governing a Virtual Enterprise (an Example) E2E2 E3E3 E1E1 Roles: each Ei should have its director Di( * ); and the coalition C a director D C. A director Di can mint Ei-currency $ i needed to pay for services provided by Ei and it can give D C some of this currency A director D C can distribute some of its $ i currency among other directors. $1$1 $1$1 Servers at E1 can send their earning in $ 1 back to their director PCPC P2P2 P1P1 $1$1 $1$1 $1$1 $ i Currency cannot be forged—by anyone! A director D 2 can distribute its $ i budget among agents at its enterprise $1$1 $1$1

7 N. Minsky: DIMACS, e-commerce May05 The Main Challenges  The flexible formulation of such policies, so that:  they will be consistent, and  their specification and evolution would be manageable.  Enforcement of such policies, and in a scalable manner.

8 N. Minsky: DIMACS, e-commerce May05 The Compositions Approach…  Given the set {P C, P 1,..., P n } of policies.  Construct a set composed policies: {P i,j = composition (P i, P C, P j )}  Provide these compositions to the reference monitor (RM) that mediates all coalition- relevant interactions.  Compositions were studied by: Gong & Qian 96, and by Bidan & Issarny 98,...

9 N. Minsky: DIMACS, e-commerce May05 … and its Problematics  It is unlikely for arbitrary, and independently formulated, policies to be consistent—so such composition is likely to fail.  Policy composition is computationally intractable (McDaniel & Prakash 2002)—and, we need N^2 such compositions!  Inflexibility: consider changing a single P i...

10 N. Minsky: DIMACS, e-commerce May05 The Proposed Approach  Instead of creating N^2 compositions (P i, P C, P j ), we will enable each enterprise E i to create it own policy P i, subject only to the constraint that P i would conform to P C.  We will then allow E i and E j to interoperate, each enforcing its own policy, P i & P j respectively  We will do this via the control mechanism called law-governed interaction (LGI).

11 N. Minsky: DIMACS, e-commerce May05 Law-Governed Interaction (LGI) (main characteristics)  LGI is an access-control and coordination mechanism  LGI is communal: can impose mandatory policies (called “laws”) over an entire community.  Enforcement is decentralized for scalability (actually, supports a whole spectrum of decentralization).  Supports a wide range of laws including those that mandate extra actions, in a stateful manner.  Supports hierarchy and interoperability.  Efficient (overhead of about 0.1 ms), and incremental.  Due to be released this summer.

12 N. Minsky: DIMACS, e-commerce May05 Centralized Enforcement of Communal Policies * The problems: potential congestion, and single point of failure m’ x u v y m ==> y m ==> x m Legend: P---Explicit statement of a policy. I---Policy interpreter S---the interaction state of the community P I S Reference monitor * Replication does not help, if S changes rapidly enough

13 N. Minsky: DIMACS, e-commerce May05 Distributed Law-Enforcement under LGI L I S x u v y L I SxSx L I SvSv L I SySy L I SuSu m ==> y m’ m’’ m m ==> y m

14 N. Minsky: DIMACS, e-commerce May05 Deployment of LGI via a Distributed TCB (DTCB) I I I I IIx y controller server m’ adopt(L, name) L m’’ adopt(L, name) L m ==> y

15 N. Minsky: DIMACS, e-commerce May05 On the basis for trust between members of a community  For a pair of interlocutors to trust each other to comply with the same law, one needs to ensure:  that the exchange of messages is mediated by correctly implemented controllers.  that interacting controllers operate under the same law L.  Such assurances are provided, basically, via certification of controllers, and the exchange of the hash of the law. xy L I CS x L I CS y m ==> y m’’ [m’,hash(L)] C x CxCx CyCy

Hierarchy Organization of Coalition Policies (back to the case study) PCPC P1P1 P2P2 PnPn superiorsubordinate P i is defined as subordinate to P c, as thus constrained to conform to it.

17 N. Minsky: DIMACS, e-commerce May05 Interoperability  Let us focus on the interoperability between E 2 and E 1 E3E3 E2E2 E1E1 P2P2 P1P1 P3P3 PCPC

18 N. Minsky: DIMACS, e-commerce May05 Interoperability (cont.) imported(x,P 2,m) E2E2 E1E1 x y Authenticated by CA 2 and CA C Authenticated by CA 1 and CA C controller P1P1 P2P2 C x C y CS x II m export(m,y,P 1 )

19 N. Minsky: DIMACS, e-commerce May05 Conclusion  LGI implementation via the Moses middleware is to be released in May 2005, via:  This initial release would not support policy hierarchy.  For a complete treatment of the coalition problem, see: Flexible Regulation of Distributed Coalitions Ao and Minsky In Proc. of the 8th European Symposium on Research in Computer Security (ESORICS) October 2003.

Questions?

21 N. Minsky: DIMACS, e-commerce May05 Server-Centric Access-Control (AC) Reference Monitor (RM) server It generally supports only stateless, purely reactive, ACL-based policies, enhanced with RBAC—and this is far from sufficient.

22 N. Minsky: DIMACS, e-commerce May05 Enforcing a Communal AC Policy Enterprise-wide (communal) policy P Enterprise delegate The communal policy may be that certain type of transactions need to be monitores…