2006
DOI: 10.1007/11790754_7
|View full text |Cite
|
Sign up to set email alerts
|

Using Contextual Security Policies for Threat Response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
4
3
1

Relationship

5
3

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Proposals like [18] and [19] deal with the deployment of reactive policies to neutralize security threats. In [19], the threats are modeled as contexts. Then, standard IDMEF alerts are mapped to the contexts.…”
Section: Policy Based Network Managementmentioning
confidence: 99%
“…Proposals like [18] and [19] deal with the deployment of reactive policies to neutralize security threats. In [19], the threats are modeled as contexts. Then, standard IDMEF alerts are mapped to the contexts.…”
Section: Policy Based Network Managementmentioning
confidence: 99%
“…However, neither [18] nor [26] give clear indication about the response strategy or the mapping from alerts to countermeasures. [15] and [16] deal with deploying a security policy and with providing responses to security threats. In [16] the threats are modeled as contexts and the IDMEF alerts are mapped to contexts.…”
Section: Related Workmentioning
confidence: 99%
“…[15] and [16] deal with deploying a security policy and with providing responses to security threats. In [16] the threats are modeled as contexts and the IDMEF alerts are mapped to contexts. In [15] not only contexts but new policy instances are derived as a result of IDMEF alerts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The two main approaches being used by researchers for establishing security requirements are the threat analysis-based approach and the evaluation criteria-based approach. Threat analysis is essential and has been studied intensively by reseachers (Debar et al, 2006;Thomson & von Solms, 1998;von Solms, 1996;von Solms et al, 1994;White, Fisch, & Pooch, 1996;Whitman, 2004). However, as evaluation processes for computing environment security evolved and computing technologies progressed, the standard evaluation criteria-based approach gained in popularity among researchers.…”
Section: Introductionmentioning
confidence: 99%