A Survivable Virtual Terminal Based on Environment-Awareness

Now more and more organizations connect to the Internet, accepting the risks along with the benefits. In order to provide sufficient protection against increasingly sophisticated cyber-attacks, survivability technology is explored. For a terminal user, it is very important to construct a survivable workstation. A fine survivable workstation should sense multiple environment factors. To address this problem, we propose a novel Environment-Aware Virtual Terminal (EAVT) solution. It mainly consists of two parts: ERBAC(Environment RBAC) and VT (Virtual Terminal). In our solution, a end-user in Internet can perform his tasks in a VT by the control of ERBAC. Because of VT introduced, all sophisticated actions of user are protected in a close operating environment and go on in security. To illuminate it, we describe the architecture and principle of EAVT and how to implement an EAVT. Especially, we detail the structure of VT, which is the core of our model. Finally, we concluded our work.)

[1]  Min Du,et al.  Secure Vault: An Intrusion Prevention Model for Ender-Users , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).

[2]  Manoj R. Sastry,et al.  Attribute-Based Authentication Model for Dynamic Mobile Environments , 2006, SPC.

[3]  Jason Nieh,et al.  Proceedings of the 5th Symposium on Operating Systems Design and Implementation , 2022 .

[4]  Mustaque Ahamad,et al.  Generalized role-based access control , 2001, Proceedings 21st International Conference on Distributed Computing Systems.

[5]  Marko Zec,et al.  Proceedings of the Freenix Track: 2003 Usenix Annual Technical Conference Implementing a Clonable Network Stack in the Freebsd Kernel , 2022 .

[6]  Richard E. Newman,et al.  STRBAC - An approach towards spatio-temporal role-based access control , 2006, Communication, Network, and Information Security.

[7]  Glenn Durfee,et al.  Practical Uses of Virtual Machines for Protection of Sensitive User Data , 2007, ISPEC.

[8]  Min Du,et al.  An Environment-Aware Dynamic Access Control Model , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[9]  Evangelos P. Markatos,et al.  An active splitter architecture for intrusion detection and prevention , 2006, IEEE Transactions on Dependable and Secure Computing.

[10]  Ravi S. Sandhu,et al.  Toward a Usage-Based Security Framework for Collaborative Computing Systems , 2008, TSEC.

[11]  Vickie R. Westmark A definition for information system survivability , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[12]  Gregory D. Abowd,et al.  Securing context-aware applications using environment roles , 2001, SACMAT '01.