State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition
Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 380 |
---|---|
container_issue | |
container_start_page | 373 |
container_title | |
container_volume | |
creator | Harvan, M. Pretschner, A. |
description | Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection regulations, of course relate not to just one file containing the data, but likely to all copies of that file as well. In order to enforce the dissemination restrictions on all copies of the sensitive data item, we introduce a data flow model that tracks how the content of a file flows through the system (files, network sockets, main memory). By using this model, the existence of potential copies of the data is reflected in the state of the data flow model. This allows us to enforce the dissemination restrictions by relating to the state rather than all sequences of events that possibly yield copies. Generalizing this idea, we describe how usage control policies can be expressed in a related state-based manner. Finally, we present an implementation of the data flow model and state-based policy enforcement as well as first encouraging performance measurements. |
doi_str_mv | 10.1109/NSS.2009.51 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5319291</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5319291</ieee_id><sourcerecordid>5319291</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-55a04d7456241185278b384d7944998ccb142035dad616b020f25683a644e6503</originalsourceid><addsrcrecordid>eNotjztPwzAAhI0QEqhkYmTxH0jx-zFCaEulCoa0I6qcxCkWiV3ZRlX_PeGx3Om-4XQHwB1Gc4yRfnit6zlBSM85vgCFlgpJoTlVVOnL34wZYYwjJfU1KFJyDSJCCkmZvgHvdTbZlk8m2Q7ukjlYWAWfYxjgwvchtna0PsOTyx_w2WQDl0M4wW007afzB_iVfrQ-p2xHWJlhgGufbTyG5LIL_hZc9WZItvj3GdgtF9vqpdy8rdbV46Z0WPJccm4Q6yTjgjCMFSdSNVRNRDOmtWrbZrqAKO9MJ7CY5qOecKGoEYxZwRGdgfu_Xmet3R-jG0087znFmmhMvwEaClKg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Harvan, M. ; Pretschner, A.</creator><creatorcontrib>Harvan, M. ; Pretschner, A.</creatorcontrib><description>Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection regulations, of course relate not to just one file containing the data, but likely to all copies of that file as well. In order to enforce the dissemination restrictions on all copies of the sensitive data item, we introduce a data flow model that tracks how the content of a file flows through the system (files, network sockets, main memory). By using this model, the existence of potential copies of the data is reflected in the state of the data flow model. This allows us to enforce the dissemination restrictions by relating to the state rather than all sequences of events that possibly yield copies. Generalizing this idea, we describe how usage control policies can be expressed in a related state-based manner. Finally, we present an implementation of the data flow model and state-based policy enforcement as well as first encouraging performance measurements.</description><identifier>ISBN: 9781424450879</identifier><identifier>ISBN: 142445087X</identifier><identifier>EISBN: 9780769538389</identifier><identifier>EISBN: 076953838X</identifier><identifier>DOI: 10.1109/NSS.2009.51</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Control systems ; Data security ; enforcement ; information flow ; Information security ; Measurement ; Middleware ; Monitoring ; Operating systems ; Protection ; reference monitor ; Sockets ; system calls ; usage control</subject><ispartof>2009 Third International Conference on Network and System Security, 2009, p.373-380</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5319291$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5319291$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Harvan, M.</creatorcontrib><creatorcontrib>Pretschner, A.</creatorcontrib><title>State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition</title><title>2009 Third International Conference on Network and System Security</title><addtitle>ICNSS</addtitle><description>Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection regulations, of course relate not to just one file containing the data, but likely to all copies of that file as well. In order to enforce the dissemination restrictions on all copies of the sensitive data item, we introduce a data flow model that tracks how the content of a file flows through the system (files, network sockets, main memory). By using this model, the existence of potential copies of the data is reflected in the state of the data flow model. This allows us to enforce the dissemination restrictions by relating to the state rather than all sequences of events that possibly yield copies. Generalizing this idea, we describe how usage control policies can be expressed in a related state-based manner. Finally, we present an implementation of the data flow model and state-based policy enforcement as well as first encouraging performance measurements.</description><subject>Access control</subject><subject>Control systems</subject><subject>Data security</subject><subject>enforcement</subject><subject>information flow</subject><subject>Information security</subject><subject>Measurement</subject><subject>Middleware</subject><subject>Monitoring</subject><subject>Operating systems</subject><subject>Protection</subject><subject>reference monitor</subject><subject>Sockets</subject><subject>system calls</subject><subject>usage control</subject><isbn>9781424450879</isbn><isbn>142445087X</isbn><isbn>9780769538389</isbn><isbn>076953838X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjztPwzAAhI0QEqhkYmTxH0jx-zFCaEulCoa0I6qcxCkWiV3ZRlX_PeGx3Om-4XQHwB1Gc4yRfnit6zlBSM85vgCFlgpJoTlVVOnL34wZYYwjJfU1KFJyDSJCCkmZvgHvdTbZlk8m2Q7ukjlYWAWfYxjgwvchtna0PsOTyx_w2WQDl0M4wW007afzB_iVfrQ-p2xHWJlhgGufbTyG5LIL_hZc9WZItvj3GdgtF9vqpdy8rdbV46Z0WPJccm4Q6yTjgjCMFSdSNVRNRDOmtWrbZrqAKO9MJ7CY5qOecKGoEYxZwRGdgfu_Xmet3R-jG0087znFmmhMvwEaClKg</recordid><startdate>200910</startdate><enddate>200910</enddate><creator>Harvan, M.</creator><creator>Pretschner, A.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200910</creationdate><title>State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition</title><author>Harvan, M. ; Pretschner, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-55a04d7456241185278b384d7944998ccb142035dad616b020f25683a644e6503</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Access control</topic><topic>Control systems</topic><topic>Data security</topic><topic>enforcement</topic><topic>information flow</topic><topic>Information security</topic><topic>Measurement</topic><topic>Middleware</topic><topic>Monitoring</topic><topic>Operating systems</topic><topic>Protection</topic><topic>reference monitor</topic><topic>Sockets</topic><topic>system calls</topic><topic>usage control</topic><toplevel>online_resources</toplevel><creatorcontrib>Harvan, M.</creatorcontrib><creatorcontrib>Pretschner, A.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Harvan, M.</au><au>Pretschner, A.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition</atitle><btitle>2009 Third International Conference on Network and System Security</btitle><stitle>ICNSS</stitle><date>2009-10</date><risdate>2009</risdate><spage>373</spage><epage>380</epage><pages>373-380</pages><isbn>9781424450879</isbn><isbn>142445087X</isbn><eisbn>9780769538389</eisbn><eisbn>076953838X</eisbn><abstract>Usage control generalizes access control to what happens to data in the future. We contribute to the enforcement of usage control requirements at the level of system calls by also taking into account data flow: Restrictions on the dissemination of data, for instance, as stipulated by data protection regulations, of course relate not to just one file containing the data, but likely to all copies of that file as well. In order to enforce the dissemination restrictions on all copies of the sensitive data item, we introduce a data flow model that tracks how the content of a file flows through the system (files, network sockets, main memory). By using this model, the existence of potential copies of the data is reflected in the state of the data flow model. This allows us to enforce the dissemination restrictions by relating to the state rather than all sequences of events that possibly yield copies. Generalizing this idea, we describe how usage control policies can be expressed in a related state-based manner. Finally, we present an implementation of the data flow model and state-based policy enforcement as well as first encouraging performance measurements.</abstract><pub>IEEE</pub><doi>10.1109/NSS.2009.51</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424450879 |
ispartof | 2009 Third International Conference on Network and System Security, 2009, p.373-380 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5319291 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Control systems Data security enforcement information flow Information security Measurement Middleware Monitoring Operating systems Protection reference monitor Sockets system calls usage control |
title | State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T06%3A44%3A00IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=State-Based%20Usage%20Control%20Enforcement%20with%20Data%20Flow%20Tracking%20using%20System%20Call%20Interposition&rft.btitle=2009%20Third%20International%20Conference%20on%20Network%20and%20System%20Security&rft.au=Harvan,%20M.&rft.date=2009-10&rft.spage=373&rft.epage=380&rft.pages=373-380&rft.isbn=9781424450879&rft.isbn_list=142445087X&rft_id=info:doi/10.1109/NSS.2009.51&rft_dat=%3Cieee_6IE%3E5319291%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769538389&rft.eisbn_list=076953838X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5319291&rfr_iscdi=true |