SlideShare uma empresa Scribd logo
1 de 14
Cross-Domain Security Reference
Architecture
Foundation for Cross Domain Security Protocols
Wen Zhu, Dr. Lowell Vizenor Dr. Avinash Srinivasan
Agenda
 Survey of Current CDS Solutions
 Example Use Case
 CDS Reference Architecture
 CDS Security Ontology
 CDS Protocol
[1] Source: http://yellowhouseassociates.net/download/YHA_CDAA_WP.pdf
Survey of Current Cross Domain Security
Solutions (CDS)
 From the perspective of mission applications design [1]:
 Require mission application programs to design and implement their own individual
solutions
 Unavoidable vendor lock-in
 Limit CDS use to simple cases without workflows or full-duplex architectures
 Lack of flexibility required by the business
 From the perspective of enterprise security infrastructure
 CDS is commonly associated with the links between domains, instead of individual
domains
 Require the highest security level, contrary to best practice
 Implies same security terminology for both domains, which is not always practical
 Failed to scale as the number of security domains increase as in interagency cases (n
square problem)
 CDS vendors define the mission application interfaces [1]
 Limited configurability and API
 Lack of protocol for coordination among guards
 Unavoidable vendor lock-in
 From the perspective of effectiveness and performance
 Lack of a standard and flexible framework for describing information
 Require excessive amount of human intervention
[1] Source: http://yellowhouseassociates.net/download/YHA_CDAA_WP.pdf
Example Use Case: Approval of Classified
Travel
1. User submits a classified travel request through a mission planning system.
2. The system sends a web service request to a financial management system, which, in this
case, sits in a unclassified network. As the request passes through the guard, classified
information (itinerary) needs to be redacted, while the rest of the message is allowed to pass.
3. The financial management sends an email via SMTP to the mail server for the approver. Since
the mail server is on the classified side, the guard needs to restore the redacted content for the
approver to see.
4. The approver accesses the mail server from her classified workstation.
5. In reality, the workflow is likely to be more complex. But this is sufficient for our discussion.
Unclassified NetworkClassified Network
Financial
Management
System
Guard
Mission Planning
System
Mail Server
Itinerary
(S)
Cost (U)1
2
3
4
Issues Highlighted by Use Case
1. How is the guard inserted into the work flow?
1. If guard is transparent – how is the application notified of failures?
2. If guard is an active participant – Does the guard “proxy” the target system by exposing the same web service
interface? And if so, how?
3. Can the guard hide the identity of the source/target systems for security reasons – For example, I can certified to
you the message is delivered to the property system, but I cannot tell you which system it is.
4. Can the guard act as the information brokers across domain as well? For example, can the guard locate the right
recipient in the right domain for a particular message?
2. How does the guard determine which content to pass? And the redact action?
1. Is there a standard vocabulary to describe the information, the actors, the security labels, the security actions, etc?
2. Does everyone have to agree on a single set of security policies?
3. Is a single guard monitoring both Web Service and SMTP traffic on the network? Or it just monitors TCP/IP
pockets?
1. How does the guard inspect the protocol traffic?
2. If there are two different guards, how do they coordinate. For example, restore the redacted information for the
approver?
Unclassified NetworkClassified Network
Financial
Management
System
Guard
Mission Planning
System
Mail Server
Itinerary
(S)
Cost (U)
1
2
3
Application Aspects
Architecture
Concerns
Policy
Concerns
Infrastructure Aspects
Network
Concerns
Information
Concerns
Workflow
Concerns
Framework
Context
Constraints
Transport
binding
Information
Encoding
CDS Reference Architecture
 The reference architect will provide
 A framework for discussing multi-faceted concerns of CDS
 A context in which interactions among CDS participants can be
abstracted out, forming the basis for protocols
CDS Concerns
 Infrastructure Aspects
 Network Concerns: How guards interact with the network
 How CDS-specific communications (with and between the guards) relates to the
network protocol stack
 Runtime consideration: End-to-End Encryption and Authentication
 SSL/WS-Security: signature by guards?
 Information Concerns: How guards interact with information floating through them
 How application-specific communications is described and acted upon by the
guards
 Design/Runtime considerations
 Ontology framework for security concepts related to
 Ontology framework for coordination among a guards
 Workflow Concerns: How guards interact with other participants of the work flow
(i.e. mission application and other guards)
 Is a guard an active participants of the application workflow
 Design-time considerations:
 Extension of BPMN/BPEL to describe the guards and domains?
 Automated BPMN refactoring to insert the guard into a work flow model – MDA Story?
 Runtime consideration:
 WS-Addressing: Guard as an intermediary?
 WSDL: Guard as a web service endpoint?
 Application Aspects
 Architecture Concerns: How does the introduction of guards impact the
application architecture?
 Policy Concerns: What is the security requirements for information processed by
the application
Most Mature:
Considered by
most guards
today
Outside the
scope of our
discussion
Limited
Capabilities
available today:
dirty words, XSLT,
etc.
Not addressed by
most guards.
Transparent in
theory. But not in
practice
CDS Participants
 Security Domain
 Implies a consistent a security vocabulary for users (human and systems), activities and information
 A security domain MAY have one or more Security Guards.
 Security Monitor (Optional)
 Defines consistent security policies for communication with other domains using the security vocabulary.
 A Security Monitor MAY act as Policy Decision Point for the domain.
 A Security Monitor MAY communicate with the Security Guard at runtime.
 Mission Application
 Associate mission-specific concepts with the security vocabulary.
 Security Guard
 Enforces security policy defined by the mission application. MAY act a Policy Enforcement Point for the domain.
 A Security Guard monitors network traffic for one or more Network Protocols.
 A Security Guard MAY coordinate with other guards for this and other domains.
Security Domain
Security Domain
Security Domain
Mission
Application
Mission
Application
Mission
Application
Mission
Application
Mission
ApplicationMission
Application
Mission
Application
Mission
Application
Mission
Application
Inter-guard
Security
Coordination
Security
Monitor
Security
GuardSecurity
Guard
Security
Guard
Security
Administrator
Security
Monitor
Enterprise
Security System
Design Decision: Associating Guards with
Security Domains
 A Guard SHOULD be associated with a single Domain.
 Rational:
 Security:
 Guard operates at the same security level as the associated Domain without
unnecessary privilege
 The same security monitor (system and human operator) manages both the domain
and the guard, avoiding policy conflicts and duplication
 Scalability:
 Avoid n square problem in a multi domain environment
 Implication:
 Guards needs to trust each other without revealing mission information each
other
 Identify: Guards SHOULD require mutual authentication
 Trust: Mutual trust is established out of band – may be through a white list
 Migration considerations for current link-based CDS guard product
 Adapters may be developed
 In reality, the adapter functionality is implemented with the mission
applications today
Security Domain Security Domain
Adapter
Adapter
Design Decision: Guards as Active
Participants in Workflow
 Mission applications MUST be aware of the guards and communicate explicitly with the guard
 Rational:
 Need a notification mechanism in case a message is blocked by the guard for the security reasons. So that the mission
application may take appropriate action.
 End-to-end encryption may prevent the guard from inspecting the message if the message is not explicitly addressed to the
guard
 Covert Channels will be impossible if the guard actively intercept and forward the message.
 Implication:
 The guard MAY have expose the same interface (WSDL for example) as the invocation target
 A Guard MAY provide additional information management services to mission applications
 Cross-domain service discovery
 Proxy for service provider
 Proxy for service consumer
 BPMN/BPEL could be extended to model the guards as part of the work flow
 Model Driven Architecture® (MDA) approach would be leverage to automatically transform a work model to include
the guard.
Opportunity for Standardizing Interactions –
CDS Protocol Candidates
Security Domain
Security Domain
Security Domain
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n
Mission
Applicatio
n Mission
Applicatio
n
Inter-guard Security
Coordination
Security
Monitor
Security
GuardSecurity
Guard
Security
Guard
Security
Administrato
r
Security
Monitor
Enterprise
Security
System
Candidate 1:
CDS Application
Interface
Candidate 2:
Inter-guard
Coordination
Candidate 3:
Security Monitor
Interface
Candidate 4:
CDS Ontology
CDS Application Interface: Abstract
<<interface>>
Security Notification Receiver
Security
GuardMission
Application
<<interface>>
Service Proxy Interface
+ get service end point
<<interface>>
Information Discovery Interface
+ get security requirement
+ get capabilities
<<interface>>
Operational
Optional: Allow
application to
receive notices
from guard
Optional: Allow
application to
determine relevant
security policy
Required: Allow
messages to pass at
runtime
Required: Proxy a
web service
endpoint in another
domain
CDS Application Interface: WS-* Binding for
Operational Message Passing (Notional)
<S:Envelope
xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing">
<S:Header>
<wsa:To>http://fabrikam123.example/financial </wsa:To>
<wsa:Action>http://fabrikam123.example/SubmitPO</wsa:Action>
</S:Header>
<S:Body>
<Itinarary/>
<Cost/>
</S:Body>
</S:Envelope>
<wsdl>
<interface>
<operation>
<input>
… …
<wsdl>
:Service
:Information Concept
:Security Attributes
OntologyMessage
Metadata
Message
addressed to the
guard within the
same domain
The target system
in another domain
Payload definitions
are linked to
information
concepts via
SAWSDL
Annotation
Concepts are
further associated
with security
attributes
Putting It Together

Mais conteúdo relacionado

Mais procurados

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...IJNSA Journal
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesMazeBolt Technologies
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONIJNSA Journal
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkIRJET Journal
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...journalBEEI
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONIJNSA Journal
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET Journal
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in ManetIRJET Journal
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentIJTET Journal
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemesHabitamuAsimare
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkEditor IJCATR
 

Mais procurados (19)

A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
A DEFENSIVE MECHANISM CROSS LAYER ARCHITECTURE FOR MANETS TO IDENTIFY AND COR...
 
Research paper
Research paperResearch paper
Research paper
 
Common Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt TechnologiesCommon Types of DDoS Attacks | MazeBolt Technologies
Common Types of DDoS Attacks | MazeBolt Technologies
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
 
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc NetworkProbabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
Probabilistic Random Range Technique for Securing Text Over Mobile Adhoc Network
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
A44080104
A44080104A44080104
A44080104
 
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...Securing Liaison-Less Publisher/Subscriber Systems  using Identity Based Encr...
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...
 
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
Review of Detection DDOS Attack Detection Using Naive Bayes Classifier for Ne...
 
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTIONSECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
SECURE COLLABORATIVE PROCESSING ARCHITECTURE FOR MITB ATTACK DETECTION
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
IRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart GridIRJET- A Review of the Concept of Smart Grid
IRJET- A Review of the Concept of Smart Grid
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
Vertualisation
VertualisationVertualisation
Vertualisation
 
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual EnvironmentSVAC Firewall Restriction with Security in Cloud over Virtual Environment
SVAC Firewall Restriction with Security in Cloud over Virtual Environment
 
Classification and review of security schemes
Classification and review of security schemesClassification and review of security schemes
Classification and review of security schemes
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Gw2412271231
Gw2412271231Gw2412271231
Gw2412271231
 

Semelhante a Cross domain security reference architecture

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxjeffreye3
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ijcseit
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET Journal
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.pptArunKumbi1
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 

Semelhante a Cross domain security reference architecture (20)

Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...IRJET-  	  A Research Paper on Block Design-based Key Agreement for Group Dat...
IRJET- A Research Paper on Block Design-based Key Agreement for Group Dat...
 
cloud1_aggy.pdf
cloud1_aggy.pdfcloud1_aggy.pdf
cloud1_aggy.pdf
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functionsSecurity of the Data Secure the Data SASE, CNAPP and CSMA functions
Security of the Data Secure the Data SASE, CNAPP and CSMA functions
 
Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...Cloud technology to ensure the protection of fundamental methods and use of i...
Cloud technology to ensure the protection of fundamental methods and use of i...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
ANALYSIS OF SECURITY ASPECTS FOR DYNAMIC RESOURCE MANAGEMENT IN DISTRIBUTED S...
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
IRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing FeaturesIRJET - Multitenancy using Cloud Computing Features
IRJET - Multitenancy using Cloud Computing Features
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.ppt
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 

Mais de Wen Zhu

Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Wen Zhu
 
Context Driven Delivery of Aeronautical Information
Context Driven Delivery of Aeronautical InformationContext Driven Delivery of Aeronautical Information
Context Driven Delivery of Aeronautical InformationWen Zhu
 
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...Wen Zhu
 
Refactoring J2EE Application for a JBI-based ESB
Refactoring J2EE Application for a JBI-based ESBRefactoring J2EE Application for a JBI-based ESB
Refactoring J2EE Application for a JBI-based ESBWen Zhu
 
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...Wen Zhu
 
Extending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic InteroperabilityExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic InteroperabilityWen Zhu
 
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...Wen Zhu
 
Integration of Web Service Stacks in an Esb
Integration of Web Service Stacks in an EsbIntegration of Web Service Stacks in an Esb
Integration of Web Service Stacks in an EsbWen Zhu
 

Mais de Wen Zhu (8)

Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012Semantic Mediation Bus Presentation at VORTE 2012
Semantic Mediation Bus Presentation at VORTE 2012
 
Context Driven Delivery of Aeronautical Information
Context Driven Delivery of Aeronautical InformationContext Driven Delivery of Aeronautical Information
Context Driven Delivery of Aeronautical Information
 
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
 
Refactoring J2EE Application for a JBI-based ESB
Refactoring J2EE Application for a JBI-based ESBRefactoring J2EE Application for a JBI-based ESB
Refactoring J2EE Application for a JBI-based ESB
 
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...
Net-Enabled Test Environment: a Federated Approach to Establishing an Inter-a...
 
Extending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic InteroperabilityExtending SOA Infrastructure for Semantic Interoperability
Extending SOA Infrastructure for Semantic Interoperability
 
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...
Enhancing The Role Of A Large Us Federal Agency As An Intermediary In The Fed...
 
Integration of Web Service Stacks in an Esb
Integration of Web Service Stacks in an EsbIntegration of Web Service Stacks in an Esb
Integration of Web Service Stacks in an Esb
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Cross domain security reference architecture

  • 1. Cross-Domain Security Reference Architecture Foundation for Cross Domain Security Protocols Wen Zhu, Dr. Lowell Vizenor Dr. Avinash Srinivasan
  • 2. Agenda  Survey of Current CDS Solutions  Example Use Case  CDS Reference Architecture  CDS Security Ontology  CDS Protocol [1] Source: http://yellowhouseassociates.net/download/YHA_CDAA_WP.pdf
  • 3. Survey of Current Cross Domain Security Solutions (CDS)  From the perspective of mission applications design [1]:  Require mission application programs to design and implement their own individual solutions  Unavoidable vendor lock-in  Limit CDS use to simple cases without workflows or full-duplex architectures  Lack of flexibility required by the business  From the perspective of enterprise security infrastructure  CDS is commonly associated with the links between domains, instead of individual domains  Require the highest security level, contrary to best practice  Implies same security terminology for both domains, which is not always practical  Failed to scale as the number of security domains increase as in interagency cases (n square problem)  CDS vendors define the mission application interfaces [1]  Limited configurability and API  Lack of protocol for coordination among guards  Unavoidable vendor lock-in  From the perspective of effectiveness and performance  Lack of a standard and flexible framework for describing information  Require excessive amount of human intervention [1] Source: http://yellowhouseassociates.net/download/YHA_CDAA_WP.pdf
  • 4. Example Use Case: Approval of Classified Travel 1. User submits a classified travel request through a mission planning system. 2. The system sends a web service request to a financial management system, which, in this case, sits in a unclassified network. As the request passes through the guard, classified information (itinerary) needs to be redacted, while the rest of the message is allowed to pass. 3. The financial management sends an email via SMTP to the mail server for the approver. Since the mail server is on the classified side, the guard needs to restore the redacted content for the approver to see. 4. The approver accesses the mail server from her classified workstation. 5. In reality, the workflow is likely to be more complex. But this is sufficient for our discussion. Unclassified NetworkClassified Network Financial Management System Guard Mission Planning System Mail Server Itinerary (S) Cost (U)1 2 3 4
  • 5. Issues Highlighted by Use Case 1. How is the guard inserted into the work flow? 1. If guard is transparent – how is the application notified of failures? 2. If guard is an active participant – Does the guard “proxy” the target system by exposing the same web service interface? And if so, how? 3. Can the guard hide the identity of the source/target systems for security reasons – For example, I can certified to you the message is delivered to the property system, but I cannot tell you which system it is. 4. Can the guard act as the information brokers across domain as well? For example, can the guard locate the right recipient in the right domain for a particular message? 2. How does the guard determine which content to pass? And the redact action? 1. Is there a standard vocabulary to describe the information, the actors, the security labels, the security actions, etc? 2. Does everyone have to agree on a single set of security policies? 3. Is a single guard monitoring both Web Service and SMTP traffic on the network? Or it just monitors TCP/IP pockets? 1. How does the guard inspect the protocol traffic? 2. If there are two different guards, how do they coordinate. For example, restore the redacted information for the approver? Unclassified NetworkClassified Network Financial Management System Guard Mission Planning System Mail Server Itinerary (S) Cost (U) 1 2 3
  • 6. Application Aspects Architecture Concerns Policy Concerns Infrastructure Aspects Network Concerns Information Concerns Workflow Concerns Framework Context Constraints Transport binding Information Encoding CDS Reference Architecture  The reference architect will provide  A framework for discussing multi-faceted concerns of CDS  A context in which interactions among CDS participants can be abstracted out, forming the basis for protocols
  • 7. CDS Concerns  Infrastructure Aspects  Network Concerns: How guards interact with the network  How CDS-specific communications (with and between the guards) relates to the network protocol stack  Runtime consideration: End-to-End Encryption and Authentication  SSL/WS-Security: signature by guards?  Information Concerns: How guards interact with information floating through them  How application-specific communications is described and acted upon by the guards  Design/Runtime considerations  Ontology framework for security concepts related to  Ontology framework for coordination among a guards  Workflow Concerns: How guards interact with other participants of the work flow (i.e. mission application and other guards)  Is a guard an active participants of the application workflow  Design-time considerations:  Extension of BPMN/BPEL to describe the guards and domains?  Automated BPMN refactoring to insert the guard into a work flow model – MDA Story?  Runtime consideration:  WS-Addressing: Guard as an intermediary?  WSDL: Guard as a web service endpoint?  Application Aspects  Architecture Concerns: How does the introduction of guards impact the application architecture?  Policy Concerns: What is the security requirements for information processed by the application Most Mature: Considered by most guards today Outside the scope of our discussion Limited Capabilities available today: dirty words, XSLT, etc. Not addressed by most guards. Transparent in theory. But not in practice
  • 8. CDS Participants  Security Domain  Implies a consistent a security vocabulary for users (human and systems), activities and information  A security domain MAY have one or more Security Guards.  Security Monitor (Optional)  Defines consistent security policies for communication with other domains using the security vocabulary.  A Security Monitor MAY act as Policy Decision Point for the domain.  A Security Monitor MAY communicate with the Security Guard at runtime.  Mission Application  Associate mission-specific concepts with the security vocabulary.  Security Guard  Enforces security policy defined by the mission application. MAY act a Policy Enforcement Point for the domain.  A Security Guard monitors network traffic for one or more Network Protocols.  A Security Guard MAY coordinate with other guards for this and other domains. Security Domain Security Domain Security Domain Mission Application Mission Application Mission Application Mission Application Mission ApplicationMission Application Mission Application Mission Application Mission Application Inter-guard Security Coordination Security Monitor Security GuardSecurity Guard Security Guard Security Administrator Security Monitor Enterprise Security System
  • 9. Design Decision: Associating Guards with Security Domains  A Guard SHOULD be associated with a single Domain.  Rational:  Security:  Guard operates at the same security level as the associated Domain without unnecessary privilege  The same security monitor (system and human operator) manages both the domain and the guard, avoiding policy conflicts and duplication  Scalability:  Avoid n square problem in a multi domain environment  Implication:  Guards needs to trust each other without revealing mission information each other  Identify: Guards SHOULD require mutual authentication  Trust: Mutual trust is established out of band – may be through a white list  Migration considerations for current link-based CDS guard product  Adapters may be developed  In reality, the adapter functionality is implemented with the mission applications today Security Domain Security Domain Adapter Adapter
  • 10. Design Decision: Guards as Active Participants in Workflow  Mission applications MUST be aware of the guards and communicate explicitly with the guard  Rational:  Need a notification mechanism in case a message is blocked by the guard for the security reasons. So that the mission application may take appropriate action.  End-to-end encryption may prevent the guard from inspecting the message if the message is not explicitly addressed to the guard  Covert Channels will be impossible if the guard actively intercept and forward the message.  Implication:  The guard MAY have expose the same interface (WSDL for example) as the invocation target  A Guard MAY provide additional information management services to mission applications  Cross-domain service discovery  Proxy for service provider  Proxy for service consumer  BPMN/BPEL could be extended to model the guards as part of the work flow  Model Driven Architecture® (MDA) approach would be leverage to automatically transform a work model to include the guard.
  • 11. Opportunity for Standardizing Interactions – CDS Protocol Candidates Security Domain Security Domain Security Domain Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Mission Applicatio n Inter-guard Security Coordination Security Monitor Security GuardSecurity Guard Security Guard Security Administrato r Security Monitor Enterprise Security System Candidate 1: CDS Application Interface Candidate 2: Inter-guard Coordination Candidate 3: Security Monitor Interface Candidate 4: CDS Ontology
  • 12. CDS Application Interface: Abstract <<interface>> Security Notification Receiver Security GuardMission Application <<interface>> Service Proxy Interface + get service end point <<interface>> Information Discovery Interface + get security requirement + get capabilities <<interface>> Operational Optional: Allow application to receive notices from guard Optional: Allow application to determine relevant security policy Required: Allow messages to pass at runtime Required: Proxy a web service endpoint in another domain
  • 13. CDS Application Interface: WS-* Binding for Operational Message Passing (Notional) <S:Envelope xmlns:wsa="http://schemas.xmlsoap.org/ws/2004/08/addressing"> <S:Header> <wsa:To>http://fabrikam123.example/financial </wsa:To> <wsa:Action>http://fabrikam123.example/SubmitPO</wsa:Action> </S:Header> <S:Body> <Itinarary/> <Cost/> </S:Body> </S:Envelope> <wsdl> <interface> <operation> <input> … … <wsdl> :Service :Information Concept :Security Attributes OntologyMessage Metadata Message addressed to the guard within the same domain The target system in another domain Payload definitions are linked to information concepts via SAWSDL Annotation Concepts are further associated with security attributes