메뉴 건너뛰기




Volumn 5587 LNCS, Issue , 2009, Pages 176-195

A service dependency modeling framework for policy-based response enforcement

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS RULES; ARCHITECTURE ANALYSIS; DEPENDENCY MODEL; DYNAMIC ACCESS CONTROL; DYNAMIC ADAPTATIONS; FORMAL CONCEPTS; HIGH-LEVEL SYSTEMS; LOCAL RESPONSE; MODEL COMPONENTS; MODELING FRAMEWORKS; MODELING SYSTEMS; MULTIPLE CONFIGURATIONS; MULTIPLE SERVICES; NUMBER OF SERVICES; POLICY ENFORCEMENT; POLICY RULES; RESOURCE CONSUMPTION; RESPONSE PROCESS; SECURITY POLICY; SERVICE ARCHITECTURE; SERVICE DEPENDENCY; SYSTEM ARCHITECTURES; SYSTEM DESIGN;

EID: 70350658278     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-02918-9_11     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 1
    • 34548776459 scopus 로고    scopus 로고
    • Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Int. Journal of Information and Computer Security 1 (2007)
    • Stakhanova, N., Basu, S., Wong, J.: A taxonomy of intrusion response systems. Int. Journal of Information and Computer Security 1 (2007)
  • 2
    • 60349116749 scopus 로고    scopus 로고
    • Expression and deployment of reaction policies
    • Web-Based Information Technologies & Distributed Systems
    • Cuppens, F., Cuppens-Boulahia, N., Bouzida, Y., Kanoun, W., Croissant, A.: Expression and deployment of reaction policies. In: SITIS Wkshp. Web-Based Information Technologies & Distributed Systems (2008)
    • (2008) SITIS Wkshp
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Bouzida, Y.3    Kanoun, W.4    Croissant, A.5
  • 4
    • 70350687564 scopus 로고    scopus 로고
    • Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miège, A.: A formal approach to specify and deploy a network security policy. In: Wkshp. Formal Aspects in Security and Trust (2004)
    • Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miège, A.: A formal approach to specify and deploy a network security policy. In: Wkshp. Formal Aspects in Security and Trust (2004)
  • 6
    • 77952407814 scopus 로고    scopus 로고
    • Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE Int. Wkshp. Policies for Distributed Systems and Networks (2003)
    • Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: IEEE Int. Wkshp. Policies for Distributed Systems and Networks (2003)
  • 10
    • 27644574459 scopus 로고    scopus 로고
    • Informing the decision process in an automated intrusion response system
    • Papadaki, M., Furnell, S.M.: Informing the decision process in an automated intrusion response system. Information Security Technical Report 10 (2005)
    • (2005) Information Security Technical Report , vol.10
    • Papadaki, M.1    Furnell, S.M.2
  • 11
    • 70350672882 scopus 로고    scopus 로고
    • Managing application service dependencies with xml and the resource description framework
    • Ensel, C., Keller, A.: Managing application service dependencies with xml and the resource description framework. In: Proc. Int. IEEE Symp. Integrated Management, pp. 661-674 (2001)
    • (2001) Proc. Int. IEEE Symp. Integrated Management , pp. 661-674
    • Ensel, C.1    Keller, A.2
  • 12
    • 84879382694 scopus 로고    scopus 로고
    • Dependency algebra: A tool for designing robust real-time systems
    • Ding, H., Sha, L.: Dependency algebra: A tool for designing robust real-time systems. In: Proc. IEEE Int. Real-Time Systems Symp. (2005)
    • (2005) Proc. IEEE Int. Real-Time Systems Symp
    • Ding, H.1    Sha, L.2
  • 15
    • 35248836533 scopus 로고    scopus 로고
    • Balepin, I., Maltsev, S., Rowe, J., Levitt, K.N.: Using specification-based intrusion detection for automated response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 136-154. Springer, Heidelberg (2003)
    • Balepin, I., Maltsev, S., Rowe, J., Levitt, K.N.: Using specification-based intrusion detection for automated response. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 136-154. Springer, Heidelberg (2003)
  • 18
    • 70350659114 scopus 로고    scopus 로고
    • Integrated event management: Event correlation using dependency graphs
    • Gruschke, B.: Integrated event management: Event correlation using dependency graphs. In: Proc. Int. Wkshp. Distributed Systems (1999)
    • (1999) Proc. Int. Wkshp. Distributed Systems
    • Gruschke, B.1
  • 19
    • 39149105313 scopus 로고    scopus 로고
    • A system dependability modeling framework using aadl and gspns
    • de Lemos, R, Gacek, C, Romanovsky, A, eds, Architecting Dependable Systems IV, Springer, Heidelberg
    • Rugina, A.E., Kanoun, K., Kaâniche, M.: A system dependability modeling framework using aadl and gspns. In: de Lemos, R., Gacek, C., Romanovsky, A. (eds.) Architecting Dependable Systems IV. LNCS, vol. 4615, pp. 14-38. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4615 , pp. 14-38
    • Rugina, A.E.1    Kanoun, K.2    Kaâniche, M.3
  • 20
    • 70350698100 scopus 로고    scopus 로고
    • SAE-AS5506: Sae architecture analysis and design language. Int. Society of Automotive Engineers (November 2004)
    • SAE-AS5506: Sae architecture analysis and design language. Int. Society of Automotive Engineers (November 2004)
  • 21
    • 70350684118 scopus 로고    scopus 로고
    • SAE-AS5506/1: Sae architecture analysis and design language, error model annex. Int. Society of Automotive Engineers (June 2006)
    • SAE-AS5506/1: Sae architecture analysis and design language, error model annex. Int. Society of Automotive Engineers (June 2006)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.