skip to main content
10.1145/1185448.1185569acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
Article

Mobile-driven architecture for managing enterprise security policies

Published: 10 March 2006 Publication History

Abstract

Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both insiders and outsiders. There has been a variety of web-based or desktop systems implementing those mechanisms, but little supports the applicability of mobile devices in their security management. In this paper we present an approach to managing various types of enterprise security policies using mobile devices in order to effectively monitor and defend trusted domains. Specifically, we describe a security architecture for designing and implementing a mobile-enabled solution for enterprise security management, whereby various benefits such as the backup of important security policies or credentials, offline administration, immediate response, and monitoring, can be achieved. We also present a proof-of-concept implementation using Microsoft Active Directory.

References

[1]
J. Bacon, K. Moody, and W. Yao. Access control and trust in the use of widely distributed services. Softw. Pract. Exper., 33(4):375--394, 2003.
[2]
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The KeyNote trust-management system version 2. RFC 2704, September 1999.
[3]
Distributed Management Task Force, Inc. Common Information Model (CIM)-Infrastructure Specification, version 2.3, 2004.
[4]
Gartner. Extranet Access Management Magic Quadrant, Gartner Research Note (ID: M-13-6853), May 2001.
[5]
ITU. ITU-T RECOMMENDATION T.128SHARE-APPLICATION SHARING, 1997. ITU-T Q3/16.
[6]
ITU. ITU-T Recommendation X.509. Information Technology: Open Systems Interconnection - The Directory: Public-Key And Attribute Certificate Frameworks, 2000. ISO/IEC 9594--8.
[7]
S. Kandala and R. Sandhu. Secure role-based workflow models. In Proceedings of the fifteenth annual working conference on Database and application security, Norwell, MA, USA, 2002. Kluwer Academic Publishers.
[8]
A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the role life-cycle in the context of enterprise security management. In Proceedings of 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, June 2002.
[9]
G. Neumann and M. Strembeck. A scenario-driven role engineering process for functional RBAC roles. In Proceedings of 7th ACM Symposium on Access Control Models and Technologies, Monterey, CA, June 2002.
[10]
R. L. Rivest and B. Lampson. SDSI - a simple distributed security infrastructure. Technical report, September 1996.
[11]
H. Roeckle, G. Schimpf, and R. Weidinger. Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. In Proceedings of 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-27 2000.
[12]
RSA Security. RSA ClearTrust Advanced User Management Module, 2004.
[13]
R. Sandhu. Engineering authority and trust in cyberspace: the om-am and rbac way. In Proceedings of 5th ACM Workshop on Role-Based Access Control, pages 71--76, Berlin, Germany, July 26-27 2000. ACM.
[14]
D. Shin and G.-J. Ahn. A role-based infrastructure management system: Design and implementation. Concurrency and Computation: Practice and Experience, 16(11), August 2004.
[15]
D. Shin, G.-J. Ahn, S. Cho, and S. Jin. On modeling system-centric information for role engineering. In Proceedings of 8th ACM Symposium on Access Control Models and Technologies, Como, Italy, June 2-3 2003.

Cited By

View all
  • (2021)Security Architecture Framework for EnterprisesEnterprise Information Systems10.1007/978-3-030-75418-1_40(883-904)Online publication date: 1-May-2021
  • (2011)An Organization-Driven Approach for Enterprise Security Development and ManagementProceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement10.1109/SSIRI.2011.25(208-215)Online publication date: 27-Jun-2011

Index Terms

  1. Mobile-driven architecture for managing enterprise security policies

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ACMSE '06: Proceedings of the 44th annual ACM Southeast Conference
      March 2006
      823 pages
      ISBN:1595933158
      DOI:10.1145/1185448
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 March 2006

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. audit
      3. authentication
      4. enterprise security management
      5. mobile solution
      6. security policy

      Qualifiers

      • Article

      Conference

      ACM SE06
      ACM SE06: ACM Southeast Regional Conference
      March 10 - 12, 2006
      Florida, Melbourne

      Acceptance Rates

      ACMSE '06 Paper Acceptance Rate 100 of 244 submissions, 41%;
      Overall Acceptance Rate 502 of 1,023 submissions, 49%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Security Architecture Framework for EnterprisesEnterprise Information Systems10.1007/978-3-030-75418-1_40(883-904)Online publication date: 1-May-2021
      • (2011)An Organization-Driven Approach for Enterprise Security Development and ManagementProceedings of the 2011 Fifth International Conference on Secure Software Integration and Reliability Improvement10.1109/SSIRI.2011.25(208-215)Online publication date: 27-Jun-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media