Show simple item record

dc.contributor.author Lobo, Jorge
dc.contributor.author Bertino, Elisa
dc.contributor.author Russo, Alessandra
dc.date.accessioned 2021-04-15T07:48:43Z
dc.date.available 2021-04-15T07:48:43Z
dc.date.issued 2020
dc.identifier.citation Lobo J, Bertino E, Russos A. On security policy migrations. In: SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies; 2020 Jun 10-12; Barcelona, Spain. New York: Association for Computing Machinery; 2020. p. 179-88. DOI: 10.1145/3381991.3395613
dc.identifier.uri http://hdl.handle.net/10230/47124
dc.description Comunicació presentada al SACMAT '20: The 25th ACM Symposium on Access Control Models and Technologies, celebrat del 10 al 12 de juny de 2020 a Barcelona, Espanya.
dc.description.abstract There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices on the IoT. As the management of these dynamic environments becomes ever more complex, we want to propose policy migrations as a methodology to simplify the management of security policies by re-utilizing and re-deploying existing policies as the systems change. We are interested in understanding the challenges raised answering the following question: given a security policy that is being enforced in a particular source computational device, what does it entail to migrate this policy to be enforced in a different target device? Because of the differences between devices and because these devices cannot be seen in isolation but in the context where they are deployed, the meaning of the policy enforced in the source device needs to be re-interpreted and implemented in the context of the target device. The aim of the paper is to present a formal framework to evaluate the appropriateness of the migration.
dc.description.sponsorship This research was sponsored by the U.S. Army Research Laboratory and the U.K. Ministry of Defence under Agreement Number W911NF-16-3-0001. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the U.S. Army Research Laboratory, the U.S. Government, the U.K. Ministry of Defence or the U.K. Government. The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon. Jorge Lobo was also supported by the Spanish Ministry of Economy and Competitiveness under Grant Numbers TIN201681032P, MDM20150502, and the U.S. Army Research Office under agreement number W911NF1910432.
dc.format.mimetype application/pdf
dc.language.iso eng
dc.publisher ACM Association for Computer Machinery
dc.relation.ispartof SACMAT '20: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies; 2020 Jun 10-12; Barcelona, Spain. New York: Association for Computing Machinery; 2020. p. 179-88
dc.rights © 2020 Association for Computing Machinery
dc.title On security policy migrations
dc.type info:eu-repo/semantics/conferenceObject
dc.identifier.doi http://dx.doi.org/10.1145/3381991.3395613
dc.subject.keyword Security policies
dc.subject.keyword Policy migration
dc.relation.projectID info:eu-repo/grantAgreement/ES/1PE/TIN2016-81032P
dc.relation.projectID info:eu-repo/grantAgreement/ES/1PE/MDM2015-0502
dc.rights.accessRights info:eu-repo/semantics/openAccess
dc.type.version info:eu-repo/semantics/acceptedVersion

Thumbnail

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account

Statistics

In collaboration with Compliant to Partaking