Network Policy Enforcement Using Transactions: The NEUTRON Approach

We propose a tool to capture applications requirements with respect to the enforcement of network security policies in an object-oriented design language.  Once a design captures clear, concise, easily understood network requirements new technologies become possible, including network transactions and user-driven policies to remove rarely used network permissions until needed, creating a least privilege in time policy.  Existing security enforcement policies represent a model of all allowable behavior.  Only modeling allowable behavior requires that any entity that may need a permission, be granted it permanently.  Refining the modeling to distinguish between common behavior and rare behavior will increase security.  The increased security comes with costs, such as requiring users to strongly authenticate more often.  This paper discusses those costs and the complexity of increasing security enforcement models.

Dan Thomsen and Elisa Bertino. 2018. Network Policy Enforcement Using Transactions: The NEUTRON Approach. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT '18). ACM, New York, NY, USA, 129-136.