DocumentCode :
2792777
Title :
Assured Counter-Terrorism Information Sharing Using Attribute Based Information Security (ABIS)
Author :
Yuan, Eric ; Wenzel, Greg
Author_Institution :
Booz Allen & Hamilton Inc., McLean, VA
fYear :
2005
fDate :
5-12 March 2005
Firstpage :
1
Lastpage :
12
Abstract :
For counter-terrorism information sharing, just like for many other government and military operations in the post-9/11 world, the traditional mindset of "need to know" is being overtaken by the "need to share" among dynamic communities of interests (COIs). The problem with current IT environments and security mechanisms forces equal sharing of all information at the lowest common denominator, often requiring setting up new physical networks to protect the information boundaries, which is often time-consuming, costly, and not interoperable. The recent technology evolution towards service oriented architectures (SOAs) helps establish a loosely coupled, interoperable "system of systems" platform, however they also bring about their own security challenges. This paper outlines the inefficiency of conventional network boundary based, protection-oriented information security mechanisms as well as the new security challenges for the emerging SOA technologies, and proposes attribute based information security (ABIS) as a new approach for addressing these challenges. Center to this new approach is a generic attribute based access control (ABAC) model, which is based on subject, object, and environment attributes and supports both mandatory and discretionary access control needs. To realize the potentials of the ABAC model, the paper introduces a high level ABIS reference architecture, which reflects the proposed technical approaches to achieve an attribute-centric security methodology: First of all, to establish such an environment that facilitates the seamless flow of information between collaborating parties, the capability to provision and manage attributes for subjects and resources needs to be established. Secondly, attribute-binding mechanisms need to be in place to support the integrity and data assurance of the information objects. Next, the architecture should provide identification, authentication and authorization mechanisms based on the attributes. Building upon- these tasks will lead to the establishment of "trusted information domains" within a shared network infrastructure, providing the ability to establish logical COIs seamlessly, created as needed or modified as policy dictates. The paper explores the possibilities of extending the ABAC model to across trust domains, allowing multiple levels of policy enforcement and policy federation
Keywords :
authorisation; data integrity; military computing; terrorism; attribute based access control model; attribute based information security; attribute-binding mechanisms; attribute-centric security methodology; authentication mechanism; authorization mechanism; counter-terrorism information sharing; identification mechanism; policy enforcement; policy federation; service oriented architectures; trusted information domains; Access control; Authentication; Data security; Environmental management; Government; Information security; Online Communities/Technical Collaboration; Protection; Resource management; Service oriented architecture;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Aerospace Conference, 2005 IEEE
Conference_Location :
Big Sky, MT
Print_ISBN :
0-7803-8870-4
Type :
conf
DOI :
10.1109/AERO.2005.1559621
Filename :
1559621
Link To Document :
بازگشت