DOC PREVIEW
UConn CSE 298/300 - Security Issues for Distributed Computing

This preview shows page 1-2-16-17-18-33-34 out of 34 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 34 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Security Issues for Distributed ComputingOverviewSecurity for Distributed ApplicationsRecall Dynamic CoalitionsDC for Military Deployment/EngagementDC for Medical EmergencySecurity Issues: Confidence in SecuritySecurity for CoalitionsFour Categories of QuestionsSoftware Development Process QuestionsSlide 11Information Access and Flow QuestionsSlide 13Security Handlers/Processing QuestionsSecurity Handlers/Processing QuestionsSlide 16Legacy/COTS Applications QuestionsFocusing on MAC, DAC and RBACLegacy/COTS ApplicationsA Distributed Security FrameworkSlide 21Interactions and DependenciesPolicy Definition, Planning, ManagementThree-Pronged Security EmphasisSecure Software Design - T. DoanRBAC/MAC at Design LevelSecure Software Design - J. PavlichAspects for Security in UMLA Role-Slice for ProfessorsA Role Slide for StudentsMiddleware-Based Security - C. PhillipsProcess-Oriented ViewSecurity for XML DocumentsConcluding RemarksSECISS-1CSE333Prof. Steven A. Demurjian Computer Science & Engineering Department191 Auditorium Road, Box U-155The University of ConnecticutStorrs, Connecticut 06269-3155http://www.engr.uconn.edu/[email protected] Security Issues for Distributed Computing Security Issues for Distributed ComputingSECISS-2CSE333OverviewOverviewBackground and MotivationBackground and MotivationWhat are Key Distributed Security Issues?What are Major/Underlying Security Concepts?What are Available Security Approaches?Identifying Key Distributed Security RequirementsIdentifying Key Distributed Security RequirementsFrame the Solution ApproachFrame the Solution ApproachOutline UConn Research Emphasis:Outline UConn Research Emphasis:Secure Software Design (UML and AOSD)Middleware-Based Realization (CORBA/JINI)Information Exchange via XMLSECISS-3CSE333Security for Distributed ApplicationsSecurity for Distributed ApplicationsLegacyLegacyLegacyCOTSCOTSCOTSDatabaseDatabaseNETWORKJavaClientJavaClientHow is Security Handled How is Security Handled for Individual Systems?for Individual Systems?What about Distributed What about Distributed Security?Security?Security Issues for New Clients?Security Issues for New Clients?New Servers? Across Network?New Servers? Across Network?What if Security Never Available What if Security Never Available for Legacy/COTS/Database?for Legacy/COTS/Database?Security Policy, Model, Security Policy, Model, and Enforcement?and Enforcement?SECISS-4CSE333Recall Dynamic CoalitionsRecall Dynamic CoalitionsCrisisCrisis Any Situation Requiring Natl. or I’Natl. AttentionCoalitionCoalition Alliance of OrganizationsMilitary, Civilian, International or any CombinationDynamicDynamic CoalitionCoalition Formed in a Crisis and Changes as Crisis Develops Key Concern Being the Most Effective way to Solve the CrisisDynamic Coalition Problem (DCP)Dynamic Coalition Problem (DCP) Security, Resource, and Information Sharing Risks that Occur as a Result of Coalition Being FormedSECISS-5CSE333FADDAFATDSGCCS-AMCSASASCSSCSOtherABCSU.N.U.S.ANGO/PVONATOMarine CorpsNavyAir ForceArmyGCCSBattle ManagementSystemJointCommandSystemArmy Battle CommandSystemCombatOperationsSystemU.S. Global C2 SystemsDC for Military Deployment/EngagementDC for Military Deployment/EngagementLFCSCanadaSICF FranceHEROS GermanySIACCON ItalyOBJECTIVES: Securely Leverage Information in a Fluid EnvironmentProtect Information While Simultaneously Promoting the CoalitionSecurity Infrastructure in Support of DCPSECISS-6CSE333DC for Medical EmergencyDC for Medical EmergencyGovt.TransportationMilitaryMedicsLocalHealthCareCDCISSUES: Privacy vs. Availability in Medical RecordsSupport Life-Threatening Situations via Availability of Patient Data on DemandPharma.CompaniesGovt.MDs w/oBordersRedCrossRNsEMTsMDsStateHealthOtherSECISS-7CSE333Security Issues: Confidence in SecuritySecurity Issues: Confidence in SecurityAssuranceAssuranceAre the Security Privileges for Each User of DC Adequate (and Limited) to Support their Needs?What Guarantees are Given by the Security Infra-structure of DC in Order to Attain:Safety: Nothing Bad Happens During ExecutionLiveness: All Good Things can Happen During ExecutionConsistencyConsistencyAre the Defined Security Privileges for Each User Internally Consistent? Least-Privilege PrincipleAre the Defined Security Privileges for Related Users Globally Consistent? Mutual-ExclusionSECISS-8CSE333Security for CoalitionsSecurity for CoalitionsDynamic Coalitions will play a Critical Role in Dynamic Coalitions will play a Critical Role in Homeland Security during Crisis SituationsHomeland Security during Crisis SituationsCritical to Understand the Security Issues for Users Critical to Understand the Security Issues for Users and System of Dynamic Coalitionsand System of Dynamic CoalitionsMulti-Faceted Approach to SecurityMulti-Faceted Approach to SecurityAttaining Consistency and Assurance at Policy Definition and EnforcementCapturing Security Requirements at Early Stages via UML Enhancements/ExtensionsProviding a Security Infrastructure that Unifies RBAC and MAC for Distributed SettingSECISS-9CSE333Four Categories of QuestionsFour Categories of QuestionsQuestions on Software Development ProcessQuestions on Software Development ProcessSecurity Integration with Software DesignTransition from Design to DevelopmentQuestions on Information Access and FlowQuestions on Information Access and FlowUser Privileges key to Security PolicyInformation for Users and Between UsersQuestions on Security Handlers and ProcessorsQuestions on Security Handlers and ProcessorsManage/Enforce Runtime Security PolicyCoordination Across EC NodesQuestions on Needs of Legacy/COTS Appls.Questions on Needs of Legacy/COTS Appls.Integrated, Interoperative Distributed Application will have New Apps., Legacy/COTS, Future COTSSECISS-10CSE333Software Development Process QuestionsSoftware Development Process QuestionsWhat is the Challenge of Security for Software What is the Challenge of Security for Software Design?Design?How do we Integrate Security with the Software Design Process?What Types of Security Must be Available?How do we Integrate Security into OO/Component How do we Integrate Security into OO/Component Based Design?Based Design?Integration into OO Design?Integration into UML Design?What Guarantees Must be Available in Process?What Guarantees Must be Available in


View Full Document

UConn CSE 298/300 - Security Issues for Distributed Computing

Documents in this Course
Java Tool

Java Tool

58 pages

Load more
Download Security Issues for Distributed Computing
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Security Issues for Distributed Computing and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Security Issues for Distributed Computing 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?