secure virtual enclaves
play

Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard - PowerPoint PPT Presentation

Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes Outline Project Overview SVE Architecture Observations Results/Conclusions 2/4/2000 2 Coalition Examples Commercial :


  1. Secure Virtual Enclaves February 4, 2000 Deborah Shands, Richard Yee Jay Jacobs, E. John Sebes

  2. Outline  Project Overview  SVE Architecture  Observations  Results/Conclusions 2/4/2000 2

  3. Coalition Examples  Commercial : outsourcing, contractors, or customers needing limited access to corporate data  Civilian : disaster/incident response teams and crisis management  Military : joint task forces engaged in distributed collaborative planning 2/4/2000 3

  4. SVE Project Goals  Support collaborative computing  Provide mechanisms to control sharing  Enable unified approach to multiple distributed application technologies (e.g., Java, DCOM, web apps.)  Support dynamic access policies, allowing changes to: SVE membership, resources to be shared, and access types permitted 2/4/2000 4

  5. SVE Project Constraints  Ensure application transparency  Retain organizational autonomy over local resources  Use only standard network protocols  Use only commercially available operating systems 2/4/2000 5

  6. Concept of Operation enclaveB.com enclaveA.com STOP Services in SVE Principals in SVE Legend: Services partly in SVE Services not in SVE Principals not in SVE 2/4/2000 6

  7. SVE Concept of Operation  Virtual enclave: formed by collaborators sharing resources and services – Enclaves define limited trust relationships with one another – Each enclave specifies internal resources accessible to partners  Secure virtual enclave: each enclave’s exports are – Protected from access by non-SVE members – Available to SVE members as specified by access policy  Dynamic modification: automatic reconfiguration due to changes in SVE membership, resources, access policy 2/4/2000 7

  8. Outline  Project Overview  SVE Architecture  Observations  Results/Conclusions 2/4/2000 8

  9. Client-Server Architecture Enclave A Server Server SVE Interceptor/ Enforcer SVE Gateway Interceptor/ Enforcer Client Client Enclave B 2/4/2000 9

  10. SVE Infrastructure Architecture SPEX SPEX Policy Policy Admin Admin GUI GUI GUI GUI SVE Control Messages SPEX SPEX Controller Controller Access Access Access Access Access Access Calculator Calculator Calculator Calculator Calculator Calculator Interceptor/ Interceptor/ Interceptor/ Interceptor/ Interceptor/ Interceptor/ Interceptor/ Interceptor/ Enforcer Enforcer Enforcer Enforcer Enforcer Enforcer Enforcer Enforcer Enclave A Enclave B 2/4/2000 10

  11. SVE Policy Semantics  Current SVE policy semantics are very similar to Object- Oriented Domain and Type Enforcement (OODTE)  Principals are mapped to a domain equivalence class using a set of domain derivation rules  Resources are mapped to a type equivalence class  Access matrix is formed by associating a set of types with a given domain  Principal recognition rules are domain derivation rules that are published by an SVE member to allow its principals to be recognized by other SVE members 2/4/2000 11

  12. Outline  Project Overview  SVE Architecture  Observations  Results/Conclusions 2/4/2000 12

  13. Enclave Autonomy  Organizations require a certain level of autonomy  Autonomy is a difficult requirement for distributed security systems  SVE system supports autonomy  Most components of access policy used only within the local enclave  An enclave may unilaterally withdraw from an SVE at any time  Need to balance autonomy and collaboration requirements via business decisions 2/4/2000 13

  14. Ambiguous Policy Semantics  Meaning of policy statements known only within defining enclave (e.g., “manager” role)  How to prevent misunderstandings as coalitions are formed???  Establish semantics offline  Represent and negotiate semantics within system 2/4/2000 14

  15. Outline  Project Overview  SVE Architecture  Observations  Results/Conclusions 2/4/2000 15

  16. SVE Prototype Results  Supports coalition sharing  Supports dynamic changes to both coalition membership and resource access policies  Supports enclave autonomy  Provides experimental platform for studying security policies for distributed systems 2/4/2000 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend