TY - GEN
T1 - A security policy system for mobile autonomic networks
AU - Aljnidi, Mohamad
AU - Leneutre, Jean
N1 - Publisher Copyright:
Copyright © 2007 ICST.
PY - 2007/1/1
Y1 - 2007/1/1
N2 - An autonomic security system is indispensable for the operation of an autonomic network. Policies are basic stones in building autonomic systems. In this paper, we introduce our model of mobile autonomic networks. Accordingly, we propose a security framework for building autonomic security systems. In this framework, we discuss a trust model based on node communities, an authentication model based on node categorization, and a secure relation model based on both trust and node capabilities. A network evolution model is eventually presented as the working context of an autonomic security system. Afterwards, we explain our vision of autonomic policy systems, and relevantly present solutions for security policy representation and manipulation. Finally, we define an authorization model for mobile autonomic networks, before elaborating an example of the implementation and the negotiation of a relevant access control policy.
AB - An autonomic security system is indispensable for the operation of an autonomic network. Policies are basic stones in building autonomic systems. In this paper, we introduce our model of mobile autonomic networks. Accordingly, we propose a security framework for building autonomic security systems. In this framework, we discuss a trust model based on node communities, an authentication model based on node categorization, and a secure relation model based on both trust and node capabilities. A network evolution model is eventually presented as the working context of an autonomic security system. Afterwards, we explain our vision of autonomic policy systems, and relevantly present solutions for security policy representation and manipulation. Finally, we define an authorization model for mobile autonomic networks, before elaborating an example of the implementation and the negotiation of a relevant access control policy.
KW - Ad-Hoc Networks
KW - Autonomic Computing
KW - Autonomic Networks
KW - Security Models
KW - Security Policy Management
U2 - 10.4108/ICST.AUTONOMICS2007.2205
DO - 10.4108/ICST.AUTONOMICS2007.2205
M3 - Conference contribution
AN - SCOPUS:49149119196
T3 - Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007
BT - Proceedings of the 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007
PB - ICST
T2 - 1st International Conference on Autonomic Computing and Communication Systems, Autonomics 2007
Y2 - 28 October 2007 through 30 October 2007
ER -