IFIP International Federation for Information Processing
DOI: 10.1007/1-4020-8128-6_24
|View full text |Cite
|
Sign up to set email alerts
|

Configuring Storage-Area Networks for Mandatory Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 5 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…According to the model of SANs defined in [20,1], a SAN is composed from the following elements, as illustrated in Figure 1, where the terminal connectors express many-one and many-many relations among the different elements of the model. These elements are described in the following paragraphs.…”
Section: Storage-area Networkmentioning
confidence: 99%
“…According to the model of SANs defined in [20,1], a SAN is composed from the following elements, as illustrated in Figure 1, where the terminal connectors express many-one and many-many relations among the different elements of the model. These elements are described in the following paragraphs.…”
Section: Storage-area Networkmentioning
confidence: 99%
“…In another paper [4], a security metric based on the aggregate risk of having data from different customers make use of the same device is defined. For example, a storage service provider may decide to store data from a single commercial bank on a storage unit and to accept a level of risk r in making that assignment while adding an airline's data to that storage unit may increase the risk of the assignment by a small amount but adding a competitive bank to the same unit may raise the risk considerably.…”
Section: Properties Of a Service-oriented Systemmentioning
confidence: 99%
“…This metric is not used in the OPL implementation described in this paper, but was used in a separate OPL model described in [4].…”
Section: Properties Of a Service-oriented Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…In [15], confidence rated information flow policies are used to model interoperation between PDAs and Workstations: we have a higher degree of confidence in the flows that are constrained by the workstation security mechanism than we have in flows constrained by the PDA application. In [1] we consider how best to configure Storage Area Networks from components having varying security guarantees, while ensuring that mandatory security rules are enforced. These approaches do not consider covert-channels or in-depth formal analysis of protection mechanisms.…”
Section: Introductionmentioning
confidence: 99%