Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes.

Slides:



Advertisements
Similar presentations
An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Advertisements

Chemawawin Cree Nation. Community Planning Change, Expectations and Performance Some Observations Chief Clarence Easter Chemawawin Cree Nation Aboriginal.
NRL Security Architecture: A Web Services-Based Solution
Department of Computer Science and Engineering University of Washington Brian N. Bershad, Stefan Savage, Przemyslaw Pardyak, Emin Gun Sirer, Marc E. Fiuczynski,
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Service Oriented Architecture Concepts March 27, 2006 Chris Armstrong
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Situation Aware Mobile Computing (SAMC) CPSC 608 Project Spring 2002 Project Members: Brent Dinkle Hemant Mahawar Marco Morales Sreekanth R. Sambavaram.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Copyright B. Wilkinson, This material is the property of Professor Barry Wilkinson (UNC-Charlotte) and is for the sole and exclusive use of the students.
Grids and Grid Technologies for Wide-Area Distributed Computing Mark Baker, Rajkumar Buyya and Domenico Laforenza.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Understanding Active Directory
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
February Semantion Privately owned, founded in 2000 First commercial implementation of OASIS ebXML Registry and Repository.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
IT Infrastructure for Business
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Evaluation of a Publish/Subscribe System for Collaboration and Mobile Working Collaborative Advertising over Internet with Agents Independent Study: Wireless.
Module 5: Designing a Terminal Services Infrastructure.
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
8.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 8: Planning.
7-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Chapter 7 IT Infrastructures.
An application architecture specifies the technologies to be used to implement one or more (and possibly all) information systems in terms of DATA, PROCESS,
1 Administering Shared Folders Understanding Shared Folders Planning Shared Folders Sharing Folders Combining Shared Folder Permissions and NTFS Permissions.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Identity Management and Enterprise Single Sign-On (ESSO)
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Secure middleware patterns E.B.Fernandez. Middleware security Architectures have been studied and several patterns exist Security aspects have not been.
Introduction to Active Directory
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Vignesh Ravindran Sankarbala Manoharan. Infrastructure As A Service (IAAS) is a model that is used to deliver a platform virtualization environment with.
Data Security in Local Network Using Distributed Firewall Presented By- Rahul N.Bais Guide Prof. Vinod Nayyar H.O.D Prof.Anup Gade.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
Web GIS: Architectural Patterns and Practices
Jens Ziegler, Markus Graube, Johannes Pfeffer, Leon Urbas
Data and Applications Security
Data and Applications Security Developments and Directions
Information Collection and Presentation Enriched by Remote Sensor Data
Data and Applications Security
Data and Applications Security Developments and Directions
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
IT INFRASTRUCTURES Business-Driven Technologies
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
The Anatomy and The Physiology of the Grid
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes

2/4/20002 Outline Project Overview SVE Architecture Observations Results/Conclusions

2/4/20003 Coalition Examples Commercial : outsourcing, contractors, or customers needing limited access to corporate data Civilian : disaster/incident response teams and crisis management Military : joint task forces engaged in distributed collaborative planning

2/4/20004 SVE Project Goals Support collaborative computing Provide mechanisms to control sharing Enable unified approach to multiple distributed application technologies (e.g., Java, DCOM, web apps.) Support dynamic access policies, allowing changes to: SVE membership, resources to be shared, and access types permitted

2/4/20005 SVE Project Constraints Ensure application transparency Retain organizational autonomy over local resources Use only standard network protocols Use only commercially available operating systems

2/4/20006 Concept of Operation enclaveA.com enclaveB.com Legend: Services in SVE Services partly in SVE Services not in SVEPrincipals not in SVE Principals in SVE STOP

2/4/20007 SVE Concept of Operation Virtual enclave: formed by collaborators sharing resources and services –Enclaves define limited trust relationships with one another –Each enclave specifies internal resources accessible to partners Secure virtual enclave: each enclave’s exports are –Protected from access by non-SVE members –Available to SVE members as specified by access policy Dynamic modification: automatic reconfiguration due to changes in SVE membership, resources, access policy

2/4/20008 Outline Project Overview SVE Architecture Observations Results/Conclusions

2/4/20009 Server SVE Interceptor/ Enforcer Server SVE Interceptor/ Enforcer Gateway Enclave A Client Enclave B Client-Server Architecture

2/4/ SPEX Controller Access Calculator Access Calculator Access Calculator SPEX Admin GUI Policy GUI Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Enclave A SPEX Controller Access Calculator Access Calculator Access Calculator SPEX Admin GUI Policy GUI Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Enclave B SVE Control Messages SVE Infrastructure Architecture

2/4/ Current SVE policy semantics are very similar to Object- Oriented Domain and Type Enforcement (OODTE) Principals are mapped to a domain equivalence class using a set of domain derivation rules Resources are mapped to a type equivalence class Access matrix is formed by associating a set of types with a given domain Principal recognition rules are domain derivation rules that are published by an SVE member to allow its principals to be recognized by other SVE members SVE Policy Semantics

2/4/ Outline Project Overview SVE Architecture Observations Results/Conclusions

2/4/ Enclave Autonomy Organizations require a certain level of autonomy Autonomy is a difficult requirement for distributed security systems SVE system supports autonomy Most components of access policy used only within the local enclave An enclave may unilaterally withdraw from an SVE at any time Need to balance autonomy and collaboration requirements via business decisions

2/4/ Ambiguous Policy Semantics Meaning of policy statements known only within defining enclave (e.g., “manager” role) How to prevent misunderstandings as coalitions are formed??? Establish semantics offline Represent and negotiate semantics within system

2/4/ Outline Project Overview SVE Architecture Observations Results/Conclusions

2/4/ SVE Prototype Results Supports coalition sharing Supports dynamic changes to both coalition membership and resource access policies Supports enclave autonomy Provides experimental platform for studying security policies for distributed systems