Issue No. 06 - November/December (2009 vol. 7)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2009.189
Michael E. Locasto , George Mason University
Sergey Bratus , Dartmouth College
Brian Schulte , The College of New Jersey
A wide variety of security software competes for control of desktops, servers, and handhelds. Competition for control over a system's security posture can leave systems mired in a performance tar pit and subvert the very security they were meant to provide. Although the use of defense in-depth is widely recommended, it isn't nearly as automated as it could be, particularly when it comes to composing policy in addition to functionality. We suggest a paradigm in which security programmers intentionally design their code to cooperate with similar software by negotiating over security-critical resources, system measurement points, event types, and trusted information flow paths.
cooperative security, security negotiation, defense-in-depth, secure systems
M. E. Locasto, S. Bratus and B. Schulte, "Bickering In-Depth: Rethinking the Composition of Competing Security Systems," in IEEE Security & Privacy, vol. 7, no. , pp. 77-81, 2009.