%0 Conference Proceedings %T Distributed Security Policy Conformance %+ University of Illinois at Urbana-Champaign [Urbana] (UIUC) %A Montanari, Mirko %A Chan, Ellick %A Larson, Kevin %A Yoo, Wucherl %A Campbell, Roy, H. %Z Part 6: Policy Compliance and Obligations %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 26th International Information Security Conference (SEC) %C Lucerne, Switzerland %Y Jan Camenisch %Y Simone Fischer-Hübner %Y Yuko Murayama %Y Armand Portmann %Y Carlos Rieder %I Springer %3 Future Challenges in Security and Privacy for Academia and Industry %V AICT-354 %P 210-222 %8 2011-06-07 %D 2011 %R 10.1007/978-3-642-21424-0_17 %Z Computer Science [cs]Conference papers %X Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection.This paper presents Odessa, a resilient system for monitoring and validating compliance of networked systems to complex policies. To manage the scale of infrastructure systems and to avoid single points of failure or attack, Odessa distributes policy validation across many network nodes. Partial delegation enables the validation of component policies and of liveness at the edge nodes of the network using redundancy to increase security. Redundant distributed servers aggregate data to validate more complex policies. Our practical implementation of Odessa resists Byzantine failure of monitoring using an architecture that significantly increases scalability and attack resistance. %G English %Z TC 11 %2 https://inria.hal.science/hal-01567586/document %2 https://inria.hal.science/hal-01567586/file/978-3-642-21424-0_17_Chapter.pdf %L hal-01567586 %U https://inria.hal.science/hal-01567586 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-SEC %~ IFIP-AICT-354