Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456 STRONGMAN
Scalable Trust of Next Generation Management (STRONGMAN)
Mechanisms such as
IPsec
allow cryptographically secured communication among nodes and network
elements on the IP Internet. Furthermore, the role of firewalls as
access control and policy enforcement points in such an infrastructure
becomes even more profound. Building a secure next generation
information infrastructure demands automated management of keys and
policy, for reasons of both risk management (in the small) and
automatic configuration of boundary controllers (as the information
infrastructure is scaled to an environment with many millions of
nodes).
By automated management, we mean the translation of a high-level
security policy into actions which support that policy at every
relevant level of the information infrastructure. Thus, security
policy must be reflected in decisions about trust of sources of
information, for example in the acceptance of a remote invocation. Our
belief is that the investigation of scalable automated trust
management will lead to a huge leap forward in the ability of an
organization to deploy an auditable error-free realization of network
infrastructure meeting security policy goals.
The basis of our approach is the
KeyNotetrust management system
being investigated at the
University of Pennsylvania
and
AT&T; Labs -- Research.
KeyNote is a compact simplified representation of trust relationships
based on the ideas of the AT&T; PolicyMaker system; trust relationships
are specified in terms of a symbolic language which when executed
results in exchanges of cryptographic credentials which map the trust
relationships into allowed and disallowed actions. In the proposed
effort, KeyNote will be integrated with IPsec and a firewall package
to allow automatic configuration of groups of IP routers under control
of a specified security policy. The novelty of this approach is that a
high-level security policy can be expressed in a ``meta-KeyNote''
which generates KeyNote expressions (perhaps millions on a large
information infrastructure) which are in turn mapped to specific
secure exchanges to control actions at, among other locations,
boundary controllers.
Activities
Developed FileTeller, a system for buying and selling storage
on the network utilizing a micropayment scheme.
Added KeyNote support in isakmpd, a free implementation of
the IPsec IKE
key management protocol. This is being distributed as part of the
OpenBSD system since 1999. See the
isakmpd.policy
man page for more details.
Added KeyNote support in the Apache
web server's mod_ssl module (an implementation of the
SSL/TLS
protocol using the
OpenSSL library. We intend to
release this software in the summer of 2001.
Added KeyNote support in the OpenSSH
implementation of the
Secure Shell
protocol. This is still work in progress (as of summer 2001).
Developed the distributed firewall concept (in
collaboration with Steve Bellovin, AT&T; Labs -- Research) and built a
prototype system, based on IPsec and KeyNote policies, for scalable,
fine-grained network access control. See the Papers section below.
Developed a transparent firewall that can enforce
network-layer security policies in conjunction with IPsec. We are
working on integrating this with the distributed firewall concept. See
the Papers section below.
We have developed a decentralized architecture for managing the
security policy of a large network. Our approach allows multiple
high-level policy languages to be used simultaneously in expressing
the security policy requirements for any number of applications,
networks, nodes, and users. The high-level expressions are compiled to
KeyNote credentials, that are then distributed to end-users. Policy
Enforcement Points find out the policies that affect them on an
as-needed basis, greatly reducing the amount of resources needed to
store and process policies.
Matt Blaze, John
Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, Pekka Nikander,
and Vassilis Prevelakis. To appear in the Proceedings of the 8th
IFIP Personal Wireless Communications (PWC) Conference. September
2003, Venice, Italy.
Sotiris Ioannidis, Steven
M. Bellovin, John Ioannidis, Angelos D. Keromytis, and Jonathan
M. Smith. In Proceedings of the IEEE International Workshops on
Enabling Technologies: Infrastructure for Collaborative Enterprises
(WETICE), Workshop on Enterprise Security, Special Session on Trust
Management in Collaborative Global Computing. June 2003, Linz,
Austria.
Alexander Levine, Vassilis Prevelakis, John
Ioannidis, Sotiris Ioannidis, and Angelos D. Keromytis. In
the Proceedings of the IEEE International Workshops on Enabling
Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop
on Distributed and Mobile Collaboration. June 2003, Linz,
Austria.
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioannidis, John
Ioannidis, Angelos D. Keromytis, and Jonathan M. Smith.
In Proceedings of USENIX 2003 Annual Technical Conference, Freenix
Track, pp. 165
- 178. June 2003, San Antonio, TX.
Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, and Jonathan
M. Smith. In the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C.
April 22-24, 2003
Stefan Miltchev, Sotiris Ioannidis, and Angelos Keromytis. In Proceedings of USENIX 2002 Annual Technical Conference, Freenix Track. June 2002, Monterey.
John Ioannidis, Sotiris Ioannidis, Angelos D. Keromytis, and Vassilis Prevelakis. In Proceedings of Financial Cryptography (FC) 2002. March 2002, Bermuda.
Matt Blaze, John Ioannidis, and Angelos
D. Keromytis. In Proceedings of the Internet Society
Symposium on Network and Distributed Systems Security (SNDSS)
2001, pp. 139 - 151. February 2001, San Diego, CA.
Sotiris Ioannidis, Angelos D. Keromytis,
Steve Bellovin, and Jonathan M. Smith. In Proceedings of the ACM
Computer and Communications Security (CCS) 2000, pp. 190 - 199.
November 2000, Athens, Greece.
Niklas Hallqvist and Angelos D.
Keromytis. In Proceedings of the USENIX 2000 Annual Technical
Conference, Freenix Track, pp. 201 - 214. June 2000, San Diego,
CA.
Angelos D. Keromytis and
Jason Wright. In Proceedings of the USENIX 2000 Annual Technical
Conference, Freenix Track, pp. 215 - 226. June 2000, San Diego,
CA.
Matt Blaze, John
Ioannidis, and Angelos D. Keromytis. In Proceedings of the 1999
Security Protocols International Workshop, April 1999, Cambridge,
England.