320 likes | 473 Views
Ideas for future work. E. Fernandez 10/07/04. Where are we now?. We sent a proposal on medical security to NSF—It was not funded We got money for wireless web services security—Project is starting We wrote several papers and several more are being written
E N D
Ideas for future work E. Fernandez 10/07/04
Where are we now? • We sent a proposal on medical security to NSF—It was not funded • We got money for wireless web services security—Project is starting • We wrote several papers and several more are being written • Thesis work—Tami and Juan finished their MS theses. Nelly, Andrei, Alvaro, Ajoy, and Laszlo are defining their future work
Medical security • Survey of models—Andrei has done some work on this. We will write a survey paper. • Access control model—We wrote two papers (LACCEI, eSociety). We are refining it. • New version of NSF proposal (NIH?)
Work on medical modeling • Study of medical requirements and policies: BRCH and another hospital (Tami) • Study of HL7 and JADIS (Tami) • Paper on analysis of HL7 for security (Ed and Tami) • More patterns for medical applications and extension of model
Secure software development • Paper for Las Vegas conference • Refine secure software development methodology: use cases, mapping from conceptual model to component model • More patterns for the catalog: XML firewall (Nelly, Ed, Saeed, Maria), network firewalls (Ed, Maria, Naeem, Nelly) • Adapt for wireless secure systems
Specific items to do • Extend use case templates to indicate security constraints • Extend the component pattern to include security • Map from conceptual model security to component security
Extend current work • Firewalls—Basic types are done, develop varieties • Attribute-based access control—Develop more pattern varieties and dynamic details • New pattern for virtual machine security • New pattern for virtual vault architecture
Physical/ location-based access control • Subjects are people. Protection object is a physical location. Type of access could be to a location or a part of a location. • This model can be used to control access to physical locations, e.g., rooms in a hospital. Ph.D. thesis of Alvaro • Mobile systems application—location privacy (MS Location-based services)
Wireless web services security • We completed security survey (Wireless LAN handbook). Now being extended (Mike, Ed, Maria, Saeed) • Survey of cryptographic methods for wireless security (Saeed) • Survey of web services security (Ed, Tami, Maria) • Patterns for web services and distributed security (XML firewall, Secure Broker, SAML) • Secure wireless systems architecture
Wireless web services • Many standards and still evolving • Some standards compete with each other or overlap • The situation gets more complex when we add wireless architectures • Clerify relationships between standards
Patterns for web services and distributed security • Pattern for architecture of application firewall using multiple agents. Also Reverse Proxy pattern (Nelly) • Authentication patterns (Nelly) • Survey of web services security products • Patterns for Secure Broker units (Ed)
Application Conceptual Model Adaptability Complexity Interaction Layers MVC / PAC Reflection distribution interoperation Client / Servant Adapter Broker Proxy access servant Façade management Communication ... naming Lookup resource service management ... concurrency ... event handling Client / Dispatcher / Server ... structure / extension
Security of workflow and business levels • Study UML model for ebXML registries and develop pattern. • Workflow level security: BPL4WS, ebXML • An area largely unexplored
RBAC hierarchies • R. Sandhu developed the ARBAC model • Administrators and subjects are organized in a lattice • They have applied this model to medical systems. • It is too restrictive, we can find better ways (I started in an old paper) (Saeed)
Other • VoIP (Juan)—We are writing two papers (Ed, Mike) • Chemical engineering patterns (Deepa) • Third party assurance (Mike) • Sarbanes/Oxley –regulation for financial institutions, this is a good area, nothing done on security aspects
Conclusions • Many possibilities, all interesting • Look at Recent Publications in my web page and at past talks, ask me for references • Select an idea, write something, submit it for discussion (email) • Make a presentation for the group • Paper for conference or journal and/or thesis/dissertation