2010
DOI: 10.1002/spe.1014
|View full text |Cite
|
Sign up to set email alerts
|

Scalable model‐based configuration management of security services in complex enterprise networks

Abstract: Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large‐scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 45 publications
0
2
0
Order By: Relevance
“…This work consolidates and extends research results from a number of previous publications [83,85,86,87,88,89,90,91,92]. Additionally, two diploma theses at the University of Dortmund [53,55] were co-supervised by the author and contribute to the achievements here presented.…”
Section: Organisationsupporting
confidence: 81%
See 2 more Smart Citations
“…This work consolidates and extends research results from a number of previous publications [83,85,86,87,88,89,90,91,92]. Additionally, two diploma theses at the University of Dortmund [53,55] were co-supervised by the author and contribute to the achievements here presented.…”
Section: Organisationsupporting
confidence: 81%
“…Esta tese consolida e estende resultados de diversas publicações anteriores do autor [83,85,86,87,88,89,90,91,92]. Além disso, duas teses de mestrado foram co-orientadas pelo autor na Universidade de Dortmund (Alemanha) [53,55] e também contribuem com resultados para o presente trabalho.…”
Section: Organização Da Teseunclassified
See 1 more Smart Citation
“…The capturing and modeling of security requirements is an important concern. An extension of policy-based management and policy hierarchies is proposed in [9] to automatically derive configuration files for large-scale networks. As in our approach (cf.…”
Section: Related Workmentioning
confidence: 99%
“…These alarms are first evaluated by the Master Analysis agent, which then notes the level of confidence of the attack and sends it to an Analysis agent, which then produces a tailored plan of response for the attack. Based on the same concern of capturing and modeling of security requirements, Albuquerque et al pro-posed policy-based management framework to automatically derive security configuration for enterprise networks [98]. Their proposal tackles the issue during the design stage of security configuration.…”
Section: Policy-based Dynamic Adaptationmentioning
confidence: 99%