메뉴 건너뛰기




Volumn 6514 LNCS, Issue , 2011, Pages 216-230

A DSL for specifying autonomic security management strategies

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKING; DIGITAL SUBSCRIBER LINES; ECONOMIC AND SOCIAL EFFECTS; PROBLEM ORIENTED LANGUAGES;

EID: 79952253206     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19348-4_16     Document Type: Conference Paper
Times cited : (4)

References (29)
  • 2
    • 70249094208 scopus 로고    scopus 로고
    • Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback
    • Agosta, J., et al.: Towards Autonomic Enterprise Security: Self-Defending Platforms, Distributed Detection, and Adaptive Feedback. Intel. Technology Journal 10(4) (2006)
    • (2006) Intel. Technology Journal , vol.10 , Issue.4
    • Agosta, J.1
  • 3
    • 27644497750 scopus 로고    scopus 로고
    • Policy-Based Management of Networked Computing Systems
    • Agrawal, D., Lee, K.-W., Lobo, J.: Policy-Based Management of Networked Computing Systems. IEEE Communications Magazine 43(10), 69-75 (2005)
    • (2005) IEEE Communications Magazine , vol.43 , Issue.10 , pp. 69-75
    • Agrawal, D.1    Lee, K.-W.2    Lobo, J.3
  • 5
    • 38349054601 scopus 로고    scopus 로고
    • An Integrated Model for Access Control and Information Flow Requirements
    • Cervesato, I. (ed.) ASIAN 2007. Springer, Heidelberg
    • Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: An Integrated Model for Access Control and Information Flow Requirements. In: Cervesato, I. (ed.) ASIAN 2007. LNCS, vol. 4846, pp. 111-125. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4846 , pp. 111-125
    • Ayed, S.1    Cuppens-Boulahia, N.2    Cuppens, F.3
  • 8
    • 0037232265 scopus 로고    scopus 로고
    • Security in an Autonomic Computing Environment
    • Chess, D., Palmer, C., White, S.: Security in an Autonomic Computing Environment. IBM Systems Journal 42(1), 107-118 (2003)
    • (2003) IBM Systems Journal , vol.42 , Issue.1 , pp. 107-118
    • Chess, D.1    Palmer, C.2    White, S.3
  • 9
    • 33845537277 scopus 로고    scopus 로고
    • Self-protection for Distributed Component-Based Applications
    • Datta, A.K., Gradinariu, M. (eds.) SSS 2006. Springer, Heidelberg
    • Claudel, B., De Palma, N., Lachaize, R., Hagimont, D.: Self-protection for Distributed Component-Based Applications. In: Datta, A.K., Gradinariu, M. (eds.) SSS 2006. LNCS, vol. 4280, pp. 184-198. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4280 , pp. 184-198
    • Claudel, B.1    De Palma, N.2    Lachaize, R.3    Hagimont, D.4
  • 13
    • 33746455182 scopus 로고    scopus 로고
    • Using Contextual Security Policies for Threat Response
    • Büschkes, R., Laskov, P. (eds.) DIMVA 2006. Springer, Heidelberg
    • Debar, H., Thomas, Y., Boulahia-Cuppens, N., Cuppens, F.: Using Contextual Security Policies for Threat Response. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 109-128. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4064 , pp. 109-128
    • Debar, H.1    Thomas, Y.2    Boulahia-Cuppens, N.3    Cuppens, F.4
  • 19
    • 60849133598 scopus 로고    scopus 로고
    • A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control
    • Lacoste, M., Jarboui, T., He, R.: A Component-Based Policy-Neutral Architecture for Kernel-Level Access Control. Annals of Telecommunications 64(1-2), 121-146 (2009)
    • (2009) Annals of Telecommunications , vol.64 , Issue.1-2 , pp. 121-146
    • Lacoste, M.1    Jarboui, T.2    He, R.3
  • 20
    • 33745167684 scopus 로고    scopus 로고
    • When and How to Develop Domain-Specific Languages
    • Mernik, M., Heering, J., Sloane, A.: When and How to Develop Domain-Specific Languages. ACM Computing Surveys 37(4), 316-344 (2005)
    • (2005) ACM Computing Surveys , vol.37 , Issue.4 , pp. 316-344
    • Mernik, M.1    Heering, J.2    Sloane, A.3
  • 21
    • 33646181776 scopus 로고    scopus 로고
    • Weaving Executability into Object-Oriented Meta-languages
    • Briand, L.C., Williams, C. (eds.) MoDELS 2005. Springer, Heidelberg
    • Muller, P.-A., Fleurey, F., Jézéquel, J.-M.: Weaving Executability into Object-Oriented Meta-languages. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 264-278. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3713 , pp. 264-278
    • Muller, P.-A.1    Fleurey, F.2    Jézéquel, J.-M.3
  • 22
    • 77954934078 scopus 로고    scopus 로고
    • A Survey of Access Control Models
    • NIST. A Survey of Access Control Models. In: NIST Privilege (Access) Management Workshop (2009), http://csrc.nist.gov/news-events/privilege- management-workshop/
    • (2009) NIST Privilege (Access) Management Workshop
  • 23
    • 71049117263 scopus 로고    scopus 로고
    • Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications
    • González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. Springer, Heidelberg
    • Serrano, M., van der Meer, S., Strassner, J., Paoli, S., Kerr, A., Storni, C.: Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. In: González Nieto, J., Reif, W., Wang, G., Indulska, J. (eds.) ATC 2009. LNCS, vol. 5586, pp. 249-267. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5586 , pp. 249-267
    • Serrano, M.1    Van Der Meer, S.2    Strassner, J.3    Paoli, S.4    Kerr, A.5    Storni, C.6
  • 24
    • 34548158488 scopus 로고    scopus 로고
    • An Ontology for Network Security Attacks
    • Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. Springer, Heidelberg
    • Simmonds, A., Sandilands, P., van Ekert, L.: An Ontology for Network Security Attacks. In: Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. LNCS, vol. 3285, pp. 317-323. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3285 , pp. 317-323
    • Simmonds, A.1    Sandilands, P.2    Van Ekert, L.3
  • 27
    • 26944484588 scopus 로고    scopus 로고
    • Modeling Computer Attacks: An Ontology for Intrusion Detection
    • Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. Springer, Heidelberg
    • Undercoffer, J., Joshi, A., Pinkston, J.: Modeling Computer Attacks: An Ontology for Intrusion Detection. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 113-135. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2820 , pp. 113-135
    • Undercoffer, J.1    Joshi, A.2    Pinkston, J.3
  • 28
    • 0001813087 scopus 로고    scopus 로고
    • Domain-Specific Languages: An Annotated Bibliography
    • van Deursen, A., Klint, P., Visser, J.: Domain-Specific Languages: An Annotated Bibliography. ACM SIGPLAN Notices 35(6), 26-36 (2000)
    • (2000) ACM SIGPLAN Notices , vol.35 , Issue.6 , pp. 26-36
    • Van Deursen, A.1    Klint, P.2    Visser, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.