Agent Approaches to Role-Based Security.ppt
《Agent Approaches to Role-Based Security.ppt》由会员分享,可在线阅读,更多相关《Agent Approaches to Role-Based Security.ppt(26页珍藏版)》请在麦多课文档分享上搜索。
1、Agent Approaches to Role-Based Security,S. Demurjian, Y. He, T.C. Ting, and M. Saba Computer Science & Engineering Department The University of Connecticut Storrs, Connecticut 06269-3155,steve, ting, sabaengr.uconn.edu http:/www.engr.uconn.edu/steve (860) 486 - 4818,Work Presented Herein appeared at
2、IFIP WG 11.3 13th Conference on Database Security, Seattle, WA, 1999.,Overview of Presentation,Background and Motivation Distributed and Web Based Applications Software Agent Computing Paradigm Previous and Related Work Agent Approaches to Role-Based Security Experimental Prototype via Java Aglets C
3、oncluding Remarks and Future Work,Distributed and Web-Based Applications,Utilize New and Existing Info. Innovatively Distributed/Web-Based Applications are: Combo of Legacy, COTS, DBs, New C/S Electronic Banking/Commerce Information Dissemination (Push/Pull) Leverage Computing and Network Resources
4、Transcend Available Alternatives MAC, DAC, Role-Based Employ as “Local” Solutions? New Computing Paradigms Emerging Software Agents Various Implementations,Software Agent Computing Paradigm,What is an Agent? Acts on Behalf of Individuals(Users) on Task State and Behavior in Runtime Environment Four
5、Mandatory Properties Sense/React to Environment Changes Autonomously Control Own State/Behavior Proactive to Specific User Goals Constantly Executing in Runtime Environment Stationary Agent: Limited to Single Node Mobile Agent: Migrate Across Network to Accomplish Required Tasks,Software Agent Compu
6、ting Paradigm,Agents Akin to Objects Created and Destroyed Interact by Passing Messages Remote Method Invocation Prohibited Attractiveness of Agents for Security Agents Created by Client to Carry Out Secure Access to Remote Clients Visit Multiple Nodes to Satisfy “Request” Specificity of Role Dictat
7、es Agent Behavior Caveat: Mobile Agents Significant Security Concern Due to Potential Ability to Act as Threat!,Influence of Previous and Related Work,Our Previous Efforts in Software Architectural Alternatives with Limited Distribution Javas Impact and Potential on Distributed Computing/Security Re
8、lated work by Hale 1998 Secure Distributed Object and Language Programming Framework for Internet-Based Apps. Tari 1998 Distributed Object Kernel as Framework to Design and Implement Distributed Security Policies,Agent Approaches to Role-Based Security,Distributed/Web-Based Applications to Access Re
9、mote Objects of Legacy, COTs, DBs, C/S, etc. Orthogonal Goals Security to Control/Limit Interactions Distributed/Web-Based Computing to Enable Interoperation/Facilitate Access Propose and Discuss Three Agent Architectures Baseline Agent Approach Hierarchical Agent Approach Object-Security Manager Ag
10、ent Approach Assume a Role-Based Context, but Other Security Approaches may also Apply,Architecture for Baseline Agent Approach,Key:UA: User AgentIRA: Information Retrieval AgentOSA: Object Security Agent,Components and Agents,Client Application (CA) GUI/Software Tool for User User Limited to Single
11、 Role at Any Time Role/User Request Passed to UA Users Modify Single Remote Object/Request CA Manages Multiple Requests in Serial User Agent (UA) Stationary Agent Created by CA for User UA Receives Request from CA UA Transforms Request and Creates IRA UA Forwards Request to IRA and Waits UA Receives
12、 Response for IRA and Transforms for Return to CA,Components and Agents,Information Retrieval Agent (IRA) Mobile Agent Created by UA Limited to Interacting with UA and OSA IRA Created and Dispatched by UA IRA Moves from Client to Server to Client Interact with Remote Object and Return Result Object
13、Security Agent (OSA) Stationary Agent (or Collection of Security Objects) or a Mobile Agent Enforce Security Policy for Remote Object Based on Permissible Actions by Role Object Remote Object Provides Services to CA,User Agent (UA),UA Arbitrates Interaction of CA and IRA UA Allocation Strategies Use
14、r-Based Allocation (UBA) UA Dedicated to Each User, Created Upon Login, Lives During Session to Enforce Single Role of CA Multiple CAs Imply Multiple UAs - Resources Role-Based Allocation (RBA) UA Dedicated to Each Role, Shared by Multiple Users Playing Same Role Use-Counts for Allocation/Deallocati
15、on UBA Can Support Multiple Roles/User UBA vs. RBA: Number and Activity of Agents,Information Retrieval Agent (IRA),Mobile Agent Created by UA to Process CA Request IRA Access Single Remote Object Created on Client and Moves to Host (Server) Interacts with OSA: Success or Denied Access Returns to Cl
16、ient and Sends Result to UA IRA Allocation/Lifetime Strategies IRA Active as Long as UA IRA De-allocated when Request Done What are Tradeoffs of Each?,Object Security Agent (OSA),OSA as Firewall to Separate Remote Object from Outside World OSA Embodies Security Policy (Role-Based) OSA Receives Reque
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- AGENTAPPROACHESTOROLEBASEDSECURITYPPT
