Policy Enforcement Point Model

被引:0
作者
Ben Mustapha, Yosra [1 ]
Debar, Herve [1 ]
Blanc, Gregory [1 ]
机构
[1] Telecom Sudparis, SAMOVAR UMR 5157, 9 Rue Charles Fourier, F-91011 Evry, France
来源
INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I | 2015年 / 152卷
关键词
Policy Enforcement Point; Approximation Accuracy; Alert correlation; Security policy;
D O I
10.1007/978-3-319-23829-6_20
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs and PEPs, both in terms of coverage, dependencies and scope. In this paper, we focus on Policy Enforcement Points to model the objects on which they may enforce security constraints. This model, called the PEP Responsibility Domain (RD(PEP)), is build based on the configuration of the PEP following a bottom-up approach. This model can then be applied to multiple use cases, three of them are shown as examples in this paper, including policy evaluation and intrusion detection assessment and alert correlation.
引用
收藏
页码:278 / 286
页数:9
相关论文
共 5 条
  • [1] Al-Shaer ES, 2004, IEEE INFOCOM SER, P2605
  • [2] Boutaba R, 2001, LECT NOTES COMPUT SC, V1995, P247
  • [3] ROUGH SETS
    PAWLAK, Z
    [J]. INTERNATIONAL JOURNAL OF COMPUTER & INFORMATION SCIENCES, 1982, 11 (05): : 341 - 356
  • [4] Zaborovsky V., ACCESS CONTROL MODEL
  • [5] 2003, EXTENSIBLE ACCESS CO