12.07.2015 Views

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

Département Réseau, Sécurité et Multimédia Rapport d'Activités 2008

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

negotiation. These strategies specify whatshould be negotiated given a negotiationpolicy. The negotiation protocol negotiatesattributes in order to activate a permissionrule. That is, we suppose that the accesscontrol policies contain only permissions. Weproposed an algorithm [5] to rewrite policiescontaining prohibitions and permissions into anequivalent s<strong>et</strong> of policies containing onlypermissions. Finally, a prototype wasdevelopped in order to implement and test theXeNA framework.Future WorkWe are aiming to specify the alternatives thatare used at the level of the exceptiontreatment module. Many possibilities may bestudied such as defining classes of similarityb<strong>et</strong>ween the resources. In case the accessedresource cannot be revealed, a possiblealternative may be to propose a resourcebelonging to the accessed resource's classe ofsimilarity. Furthermore, we need to specify them<strong>et</strong>rics that are used in order to chooseb<strong>et</strong>ween different negotiation's strategies.Finally, these improvements must be takeninto account at the level of the proposedprototype.References[1] T. Yu, M. Winsl<strong>et</strong>t, and K. E. Seamons.Supporting structured credentials and sensitivepolicies through interoperable strategies forautomated trust negotiation. ACM Transactionson Information and System Security (TISSEC),6(1):1–42, February 2003.[2] D. Abi Haidar, F. Cuppens, N. Cuppens-Boulahia, H. Debar. An Extended RBAC Profileof XACML. ACM Workshop on Secure WebServices (SWS), in conjunction with the 13thACM Conference on Computer andCommunications Security (CCS-13), Fairfax VA,USA, November 2006.[3] D. Abi Haidar, F. Cuppens, N. Cuppens-Boulahia, H. Debar. Access Negotiation withinXACML Architecture. Second Joint Conferenceon Security in N<strong>et</strong>works Architectures andSecurity of Information Systems (SARSSI),Annecy, France, June 2007.[4] D. Abi Haidar, F. Cuppens, N. Cuppens-Boulahia, H. Debar. Resource ClassificationBased Negotiation in Web Services. ThirdInternational Symposium on InformationAssurance and Security, 2007 (IAS 2007),Manchester, UK, August 2007.[5] N. Cuppens-Boulahia, F. Cuppens, D. AbiHaidar, H. Debar. Negotiation of Prohibition:An approach Based on Policy Rewriting. Inproceedings of the IFIP InternationalInformation Security Conference SEC'08, Milan,Italy, September <strong>2008</strong>.50 Extract of Pracom’s Annual Report <strong>2008</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!