Managing application whitelists in trusted distributed systems

Many distributed batch systems, such as computational grids, require a level of integrity protection to guarantee the proper execution of a job or workflow. One way of achieving this, implicit in many trusted computing proposals, is to use application whitelisting to prevent unknown and untrusted ap...

Full description

Bibliographic Details
Main Authors: Huh, J, Lyle, J, Namiluko, C, Martin, A
Format: Journal article
Published: 2011
_version_ 1797098531147743232
author Huh, J
Lyle, J
Namiluko, C
Martin, A
author_facet Huh, J
Lyle, J
Namiluko, C
Martin, A
author_sort Huh, J
collection OXFORD
description Many distributed batch systems, such as computational grids, require a level of integrity protection to guarantee the proper execution of a job or workflow. One way of achieving this, implicit in many trusted computing proposals, is to use application whitelisting to prevent unknown and untrusted applications from being executed on remote services. However, this approach has significant shortcomings across multiple administrative domains, as conflicts between locally managed whitelists will result in many useful services appearing untrustworthy to users. This has the potential to limit availability and prevent trusted distributed systems from ever being successfully deployed. We propose a set of requirements for a system which will manage these conflicts, and provide a mechanism for updating application whitelists that will increase service availability and trustworthiness. We also suggest and specify a set of components, including a centralised configuration manager, which will meet these requirements.
first_indexed 2024-03-07T05:10:55Z
format Journal article
id oxford-uuid:db81ebf3-a198-41dc-96b6-9e0abcc18b45
institution University of Oxford
last_indexed 2024-03-07T05:10:55Z
publishDate 2011
record_format dspace
spelling oxford-uuid:db81ebf3-a198-41dc-96b6-9e0abcc18b452022-03-27T09:11:07ZManaging application whitelists in trusted distributed systemsJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:db81ebf3-a198-41dc-96b6-9e0abcc18b45Department of Computer Science2011Huh, JLyle, JNamiluko, CMartin, AMany distributed batch systems, such as computational grids, require a level of integrity protection to guarantee the proper execution of a job or workflow. One way of achieving this, implicit in many trusted computing proposals, is to use application whitelisting to prevent unknown and untrusted applications from being executed on remote services. However, this approach has significant shortcomings across multiple administrative domains, as conflicts between locally managed whitelists will result in many useful services appearing untrustworthy to users. This has the potential to limit availability and prevent trusted distributed systems from ever being successfully deployed. We propose a set of requirements for a system which will manage these conflicts, and provide a mechanism for updating application whitelists that will increase service availability and trustworthiness. We also suggest and specify a set of components, including a centralised configuration manager, which will meet these requirements.
spellingShingle Huh, J
Lyle, J
Namiluko, C
Martin, A
Managing application whitelists in trusted distributed systems
title Managing application whitelists in trusted distributed systems
title_full Managing application whitelists in trusted distributed systems
title_fullStr Managing application whitelists in trusted distributed systems
title_full_unstemmed Managing application whitelists in trusted distributed systems
title_short Managing application whitelists in trusted distributed systems
title_sort managing application whitelists in trusted distributed systems
work_keys_str_mv AT huhj managingapplicationwhitelistsintrusteddistributedsystems
AT lylej managingapplicationwhitelistsintrusteddistributedsystems
AT namilukoc managingapplicationwhitelistsintrusteddistributedsystems
AT martina managingapplicationwhitelistsintrusteddistributedsystems