Presentation is loading. Please wait.

Presentation is loading. Please wait.

Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes.

Similar presentations


Presentation on theme: "Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes."— Presentation transcript:

1 Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes

2 2/4/20002 Outline Project Overview SVE Architecture Observations Results/Conclusions

3 2/4/20003 Coalition Examples Commercial : outsourcing, contractors, or customers needing limited access to corporate data Civilian : disaster/incident response teams and crisis management Military : joint task forces engaged in distributed collaborative planning

4 2/4/20004 SVE Project Goals Support collaborative computing Provide mechanisms to control sharing Enable unified approach to multiple distributed application technologies (e.g., Java, DCOM, web apps.) Support dynamic access policies, allowing changes to: SVE membership, resources to be shared, and access types permitted

5 2/4/20005 SVE Project Constraints Ensure application transparency Retain organizational autonomy over local resources Use only standard network protocols Use only commercially available operating systems

6 2/4/20006 Concept of Operation enclaveA.com enclaveB.com Legend: Services in SVE Services partly in SVE Services not in SVEPrincipals not in SVE Principals in SVE STOP

7 2/4/20007 SVE Concept of Operation Virtual enclave: formed by collaborators sharing resources and services –Enclaves define limited trust relationships with one another –Each enclave specifies internal resources accessible to partners Secure virtual enclave: each enclave’s exports are –Protected from access by non-SVE members –Available to SVE members as specified by access policy Dynamic modification: automatic reconfiguration due to changes in SVE membership, resources, access policy

8 2/4/20008 Outline Project Overview SVE Architecture Observations Results/Conclusions

9 2/4/20009 Server SVE Interceptor/ Enforcer Server SVE Interceptor/ Enforcer Gateway Enclave A Client Enclave B Client-Server Architecture

10 2/4/200010 SPEX Controller Access Calculator Access Calculator Access Calculator SPEX Admin GUI Policy GUI Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Enclave A SPEX Controller Access Calculator Access Calculator Access Calculator SPEX Admin GUI Policy GUI Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Interceptor/ Enforcer Enclave B SVE Control Messages SVE Infrastructure Architecture

11 2/4/200011 Current SVE policy semantics are very similar to Object- Oriented Domain and Type Enforcement (OODTE) Principals are mapped to a domain equivalence class using a set of domain derivation rules Resources are mapped to a type equivalence class Access matrix is formed by associating a set of types with a given domain Principal recognition rules are domain derivation rules that are published by an SVE member to allow its principals to be recognized by other SVE members SVE Policy Semantics

12 2/4/200012 Outline Project Overview SVE Architecture Observations Results/Conclusions

13 2/4/200013 Enclave Autonomy Organizations require a certain level of autonomy Autonomy is a difficult requirement for distributed security systems SVE system supports autonomy Most components of access policy used only within the local enclave An enclave may unilaterally withdraw from an SVE at any time Need to balance autonomy and collaboration requirements via business decisions

14 2/4/200014 Ambiguous Policy Semantics Meaning of policy statements known only within defining enclave (e.g., “manager” role) How to prevent misunderstandings as coalitions are formed??? Establish semantics offline Represent and negotiate semantics within system

15 2/4/200015 Outline Project Overview SVE Architecture Observations Results/Conclusions

16 2/4/200016 SVE Prototype Results Supports coalition sharing Supports dynamic changes to both coalition membership and resource access policies Supports enclave autonomy Provides experimental platform for studying security policies for distributed systems


Download ppt "Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes."

Similar presentations


Ads by Google