Stere Preda, N. Cuppens-Boulahia, F. Cuppens, L. Toutain
{"title":"Architecture-Aware Adaptive Deployment of Contextual Security Policies","authors":"Stere Preda, N. Cuppens-Boulahia, F. Cuppens, L. Toutain","doi":"10.1109/ARES.2010.45","DOIUrl":null,"url":null,"abstract":"Abstract—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accurately evaluate the contexts viewed as constraints in which some security requirements are to be met. Dynamic or contextual requirements are problematic since they rely on specific functionalities which are not always available in the system or are even impossible to acquire given the current technologies. Therefore, it is essential to ensure that the contextual requirements are always managed and well deployed taking into account the existent functionalities in the system. We present a solution to cope with the following issue: ensuring that the contextual security requirements are always best deployed within the set of functionalities in the system.","PeriodicalId":360339,"journal":{"name":"2010 International Conference on Availability, Reliability and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2010.45","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Abstract—Deploying a security policy may prove difficult whenever the system does not embed all necessary security functionalities. Some specific functionalities are required to accurately evaluate the contexts viewed as constraints in which some security requirements are to be met. Dynamic or contextual requirements are problematic since they rely on specific functionalities which are not always available in the system or are even impossible to acquire given the current technologies. Therefore, it is essential to ensure that the contextual requirements are always managed and well deployed taking into account the existent functionalities in the system. We present a solution to cope with the following issue: ensuring that the contextual security requirements are always best deployed within the set of functionalities in the system.