Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense最新文献

筛选
英文 中文
Session details: Panel 会议详情:
C. Oehmen
{"title":"Session details: Panel","authors":"C. Oehmen","doi":"10.1145/3252360","DOIUrl":"https://doi.org/10.1145/3252360","url":null,"abstract":"","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116791148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Enforcement Framework for Virtual Machine Migration Auction 虚拟机迁移拍卖的安全实施框架
S. Majhi, P. Bera
{"title":"A Security Enforcement Framework for Virtual Machine Migration Auction","authors":"S. Majhi, P. Bera","doi":"10.1145/2809826.2809829","DOIUrl":"https://doi.org/10.1145/2809826.2809829","url":null,"abstract":"Virtual machine migration auction (VMMA) is a bidding process to select potential target cloud service providers (CSPs) for migration. It is realized as a single application running on top of the hypervisor, where the overall communication between the CSPs is done through the Internet, an insecure channel. Therefore, ensuring security along with performance satisfaction of the VMMA system is an important but challenging problem. This requires identification of various threats and development of security and systematic protection mechanism. In this paper, we present a security enforcement framework for VMMA system. The core element of our proposed framework identifies various potential threats and security constraints by investigating different interactions between participants in VMMA system. Then our framework extracts a set of formal security requirements based on the identified threats which enforces the security by using elliptic curve cryptography and bilinear pairing. Our approach will facilitate in designing and implementing strong security defense-in-depth against various threats to VMMA system in cloud computing platform.","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121123406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Session details: Session 1: Resiliency Analytics for Cyber Defense 会议详情:会议1:网络防御的弹性分析
E. Fulp
{"title":"Session details: Session 1: Resiliency Analytics for Cyber Defense","authors":"E. Fulp","doi":"10.1145/3252358","DOIUrl":"https://doi.org/10.1145/3252358","url":null,"abstract":"","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116604496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 2: Decision Making for Secure Systems 会议详情:会议2:安全系统的决策制定
Quanyan Zhu
{"title":"Session details: Session 2: Decision Making for Secure Systems","authors":"Quanyan Zhu","doi":"10.1145/3252359","DOIUrl":"https://doi.org/10.1145/3252359","url":null,"abstract":"","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124515600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Policy Specialization to Support Domain Isolation 支持域隔离的策略专门化
S. Mutti, Enrico Bacis, S. Paraboschi
{"title":"Policy Specialization to Support Domain Isolation","authors":"S. Mutti, Enrico Bacis, S. Paraboschi","doi":"10.1145/2809826.2809832","DOIUrl":"https://doi.org/10.1145/2809826.2809832","url":null,"abstract":"The exponential growth of modern information systems has introduced several new challenges in the management of security requirements. Nowadays, the technological scenario has evolved and the introduction of MAC models provides a better isolation among software components and reduces the damages that the malicious or defective ones can cause to the systems. On one hand it is important to confine applications and limit the privileges that they can request. On the other hand we want to let applications benefit from the flexibility given by MAC models, such as SELinux. In this paper we show how the constructs already available in SELinux and the specialization of security domains can be leveraged to define boundaries where the applications are confined but still able to introduce sophisticated security patterns, such as application isolation and the least privilege principle. After defining the proposed model, we describe how it can be integrated into real systems through the use of examples on Android and Apache Web Server.","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123516592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense 2015主动网络防御自动化决策研讨会论文集
E. Al-Shaer, C. Oehmen, M. Rahman
{"title":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","authors":"E. Al-Shaer, C. Oehmen, M. Rahman","doi":"10.1145/2809826","DOIUrl":"https://doi.org/10.1145/2809826","url":null,"abstract":"","PeriodicalId":303467,"journal":{"name":"Proceedings of the 2015 Workshop on Automated Decision Making for Active Cyber Defense","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信