toplogo
Inloggen

Specification and Enforcement of Activity Dependency Policies using XACML at ISSSR 2024


Belangrijkste concepten
Efficiently enforce activity dependency policies using the XACMLAD framework.
Samenvatting
The paper introduces the XACMLAD policy framework for specifying and implementing activity dependency policies. It extends the widely adopted XACML language to express policies for evaluating dependent activities and updating their states based on conditions. The enforcement architecture includes components like PAP, PRP, PDP, PEP, CH, PIP, and Obligation Service. Performance evaluation shows promising time efficiency with varying numbers of requests. Future work includes enhancing the framework for handling any number of dependent-activity levels and recursive updates in the dependency chain.
Statistieken
Accepted by ISSSR 2024 sponsored by IEEE Reliability Society. Tanjila Mawla1, Maanak Gupta1, Ravi Sandhu2 from Tennessee Tech University and University of Texas at San Antonio. Proposed XACMLAD policy framework adapts XACML to specify activity dependency policies. Performance evaluation shows efficient execution time for different numbers of requests.
Citaten
"We propose a policy framework adapting the widely-used eXtensible Access Control Markup Language (XACML), referred to as XACMLAD, to specify the activity dependency policies." "The aim of this paper is to create a policy framework referred as XACMLAD for specifying the policy language to control smart system activities based on the activity dependencies." "Our work covers the policy evaluation that includes state update actions based on conditions."

Belangrijkste Inzichten Gedestilleerd Uit

by Tanjila Mawl... om arxiv.org 03-18-2024

https://arxiv.org/pdf/2403.10092.pdf
Specification and Enforcement of Activity Dependency Policies using  XACML

Diepere vragen

How can the XACMLAD framework be enhanced to handle an unlimited number of dependent-activity levels?

To enhance the XACMLAD framework to handle an unlimited number of dependent-activity levels, a recursive approach can be implemented. This would involve creating a mechanism within the framework that allows for dynamic evaluation and updating of dependencies across multiple levels. By introducing iterative processes in policy evaluation, the framework can recursively assess dependencies at each level and make decisions based on the states of all activities involved. Additionally, incorporating mechanisms for tracking and managing complex dependency chains efficiently will enable the framework to scale effectively with an increasing number of activity levels.

What are potential challenges in implementing recursive updates in the dependency chain within the XACMLAD framework?

Implementing recursive updates in the dependency chain within the XACMLAD framework may pose several challenges: Complexity: Managing recursive updates across multiple levels of dependencies can introduce complexity into policy evaluation and enforcement. Performance: Recursive operations may impact system performance, especially when dealing with a large number of activities and intricate dependency structures. Resource Utilization: Handling recursive updates efficiently requires careful resource management to prevent bottlenecks or overload on system resources. Error Handling: Dealing with errors or exceptions during recursive updates needs robust error-handling mechanisms to ensure system stability. Security Risks: Introducing recursion opens up possibilities for security vulnerabilities if not implemented securely, potentially leading to unauthorized access or data breaches.

How does continuous policy evaluation impact real-world smart systems with interconnected devices?

Continuous policy evaluation plays a crucial role in enhancing security and operational efficiency in real-world smart systems with interconnected devices: Dynamic Adaptability: Continuous policy evaluation allows smart systems to adapt dynamically to changing conditions, ensuring that access control remains effective even as circumstances evolve. Real-time Response: By continuously monitoring activity dependencies and enforcing policies in real-time, smart systems can respond promptly to security threats or violations. Improved Compliance: Continuous policy evaluation helps maintain compliance with regulations by ensuring that access control measures align with current requirements at all times. Enhanced Security: Regular assessment of activity dependencies enhances overall security posture by identifying vulnerabilities or inconsistencies proactively. 5Operational Efficiency: Automated continuous policy enforcement streamlines operations by reducing manual intervention while maintaining a high level of security across interconnected devices.
0
visual_icon
generate_icon
translate_icon
scholar_search_icon
star