Policy Enforcement Point Model
Autor: | Yosra Ben Mustapha, Hervé Debar, Gregory Blanc |
---|---|
Přispěvatelé: | Département Réseaux et Services de Télécommunications (RST), Institut Mines-Télécom [Paris] (IMT)-Télécom SudParis (TSP), Services répartis, Architectures, MOdélisation, Validation, Administration des Réseaux (SAMOVAR), Centre National de la Recherche Scientifique (CNRS) |
Rok vydání: | 2015 |
Předmět: |
021110 strategic
defence & security studies Scope (project management) Computer science Alert correlation Security policy Point model 0211 other engineering and technologies 02 engineering and technology 16. Peace & justice Policy Enforcement Point Approximation Accuracy [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] Risk analysis (engineering) Policy decision 020204 information systems Policy enforcement 0202 electrical engineering electronic engineering information engineering Information system |
Zdroj: | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783319238289 SecureComm (1) Proceedings SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks SECURECOMM 2014: 10th International Conference on Security and Privacy in Communication Networks, Sep 2014, Beijing, China. pp.278-286, ⟨10.1007/978-3-319-23829-6_20⟩ |
DOI: | 10.1007/978-3-319-23829-6_20 |
Popis: | International audience; As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs and PEPs, both in terms of coverage, dependencies and scope. In this paper, we focus on Policy Enforcement Points to model the objects on which they may enforce security constraints. This model, called the PEP Responsibility Domain (RD(PEP)), is build based on the configuration of the PEP following a bottom-up approach. This model can then be applied to multiple use cases, three of them are shown as examples in this paper, including policy evaluation and intrusion detection assessment and alert correlation |
Databáze: | OpenAIRE |
Externí odkaz: |