Model Based Security Policy Assessment for E-Business Environment

被引:0
作者
Chu, Wang [1 ]
Feng, Yanli [1 ]
机构
[1] Shandong Inst Business & Technol, Yantai, Peoples R China
来源
PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009) | 2009年
关键词
E-business; Security policy assessment; Architecture driven system analysis; Fault tree analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The key to profitability for e-business is ensuring data integrity, service availability, and user information confidentiality along the entire e-services chain. Both staffs and IT system components need to compare secure policy with performance in an e-business environment. Currently, most efforts set focus on e-business process analysis and value-chain analysis, little attention is put on the secure policy compliance assessment. This paper presens a model based security policy assessment approach that integrates fault tree analysis technology and top-down architecture driven system analysis method. The assessment process includes security attribute scenarios generation, e-business security model construction, fault tree based threat model construction, and security policy evaluation. It can be used to analyze the security policy for the e-business environment from two different perspectives: 1) Compliance analysis between security policy and e-business security model, intended to elicit all possible discrepancies; 2) Adequacy analysis of security policy for identified threats, aiming at verifying and demonstrating whether the security policy are appropriate for the emerging secure risks.
引用
收藏
页码:88 / 93
页数:6
相关论文
共 10 条
[1]  
[Anonymous], CS032 U GLAM
[2]  
Claro DB, 2006, SEMANTIC WEB BEYOND, V3, P195, DOI 10.1007/978-0-387-34685-4_8
[3]  
Brændeland G, 2004, LECT NOTES COMPUT SC, V2995, P146
[4]  
CHEN H, 2009, P INT MULT ENG COMP
[5]  
CHIVERS H, 2004, SECURITY SYSTEMS ENG
[6]  
*INT SEC SYST, 2000, SEC E BUS
[7]  
Krsul IV, 1998, Software vulnerability analysis
[8]   Core business architecture for a service-oriented enterprise [J].
Nayak, N. ;
Linehan, M. ;
Nigam, A. ;
Marston, D. ;
Jeng, J. -J. ;
Wu, F. Y. ;
Boullery, D. ;
White, L. F. ;
Nandi, P. ;
Sanz, J. L. C. .
IBM SYSTEMS JOURNAL, 2007, 46 (04) :723-742
[9]   Intelligent data analysis with fuzzy decision trees [J].
Wang, Xiaomeng ;
Nauck, Detlef D. ;
Spott, Martin ;
Kruse, Rudolf .
SOFT COMPUTING, 2007, 11 (05) :439-457
[10]   Relations between non-Abelian Chern-Simons fields and fractional spins [J].
Wang, Yong-Long ;
Xu, Chang-Tan ;
Chen, Li .
MODERN PHYSICS LETTERS B, 2008, 22 (01) :45-50