Proceedings of the 2nd ACM Workshop on Computer Security Architectures 2008
DOI: 10.1145/1456508.1456517
|View full text |Cite
|
Sign up to set email alerts
|

Asynchronous policy evaluation and enforcement

Abstract: Evaluating and enforcing policies in large-scale networks is one of the most challenging and significant problems facing the network security community today. Current solutions are limited by an out-of-date allow/deny paradigm, and policies are evaluated synchronously and independently at each service. This makes it difficult to detect or defend against multi-stage attacks, or attacks which begin as innocent requests and then later exhibit malicious behavior in the same context. In this paper we describe Arach… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 15 publications
0
0
0
Order By: Relevance