A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
A self-extension monitoring for security management
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)
This paper presents a Self-Extension Monitoring, a new approach in monitoring intruders, securing evidence against hackers and identifying them. ...
The Self-Extension Monitoring approach minimizes temporal and spatial limitations, making it possible to collect enough information for disclosure of the intruder's identity. ...
For this reason, this paper proposed the Self-Extension Monitoring using Shadowing Mechanism for Security Management. ...
doi:10.1109/acsac.2000.898873
dblp:conf/acsac/JangK00
fatcat:re6oodvfcvcwphdjb4atx2fiui
Towards a Self-Adaptive Data Management System for Cloud Environments
2011
2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum
Self-protection through security policies enforcement: We aim to develop our security framework by introducing a Trust management module, which will dynamically compute a trust value for each user based ...
For the implementation of this layer, we relied on the MonALISA [10] monitoring system, as it is a reliable and extensible system that allowed us to define specific data to be monitored and stored. ...
doi:10.1109/ipdps.2011.381
dblp:conf/ipps/Carpen-Amarie11
fatcat:pvpcpx5ch5bljpca26b6lvx7zi
Autonomic Agents for Survivable Security Systems
[chapter]
2005
Lecture Notes in Computer Science
This paper examines the relevant technologies including Agents for engineering autonomicity and survivability in a secure location biometric system. ...
Autonomic Systems are essentially about creating self-managing systems based on the biological metaphor of the non-conscious acting autonomic nervous system. ...
Acknowledgements The development of this paper was supported by a Knowledge Transfer Partnership project funded by the UK Government's Department of Trade and Industry (DTI). ...
doi:10.1007/11596042_125
fatcat:nrbciumvj5dfxjm2xu42u2kgci
Our design is targeted at establishing a security monitor which resides completely outside of the target OS environment with a negligible overhead. ...
This paper presents VASP, a hypervisor based monitor which allows a trusted execution environment to monitor various malicious behaviors in the operating system. ...
This memory management service realizes the memory selftransparency strategy for the self-protection of the hypervisor. ...
doi:10.1145/1982185.1982305
dblp:conf/sac/ZhuYXLYGQLCG11
fatcat:eiwqynemurea7lh4d7qvfyutlm
Real-Time Intruder Tracing through Self-Replication
[chapter]
2002
Lecture Notes in Computer Science
Existing real-time intruder tracing systems has a spatial restriction. The security domain remains unchanged if there is no system security officer's intervention after installing the tracing system. ...
It is impossible to respond to an attack which is done out of the security domain. ...
Monitoring activity is indispensable for security management. Monitoring is classified into two types, system state monitoring and change monitoring [7] . ...
doi:10.1007/3-540-45811-5_1
fatcat:6aacttpffzbajnm5du2c2gvvwy
D1.4 - Supercloud Self-Management Of Security Implementation
2017
Zenodo
This Deliverable describes the implementation of the SUPERCLOUD Security Self-Management Framework. ...
Finally, we showcase the integration of Security Self-Management with SUPERCLOUD project use-cases demonstrators (i.e., Philips Imaging Platform). ...
This illustrates the complete integration of Security Self-Management with SUPERCLOUD project use-case scenarios. ...
doi:10.5281/zenodo.836958
fatcat:etiyhn3p6vavpe45dtymllywhi
SECURITY MECHANISM FOR MANETS
2009
Journal of Engineering Science and Technology
Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility. ...
Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available. ...
A protocol for securing mobile ad hoc networks based on the proposed architecture will be implemented. ...
doaj:9cfa90dcca2040aaa7f85864176cb2fd
fatcat:ptlckaar6vbhfpo7g6vyygrdtq
Supercloud Self-Management Of Security Specification
2015
Zenodo
In this document, we present a preliminary architecture of SUPERCLOUD security self-management. ...
We first identify and describe the design requirements of the user-centric self-management of multiclouds security. ...
For such decisions, an additional "location monitoring sensor" would provide input to the self-managent manager. ...
doi:10.5281/zenodo.49741
fatcat:pxpw6e4uw5c4hpdyz6wjyehbqq
Page 1160 of Management & Marketing Abstracts Vol. 31, Issue 8
[page]
2006
Management & Marketing Abstracts
Every two years the DTI surveys a thousand companies to see how they are managing security. ...
A table has been devised that sets out potential areas of knowledge worker self monitoring in various enterprise integration system modules. (3 fig, | tab, 27 ref)
2289 Security in a changing world: beating ...
The SELFNET approach to Self-Protection through Autonomic Network Management
2016
Zenodo
others to provide self-protection capabilities for detecting and mitigating potential cyber-attacks. ...
A contribution to meeting the KPIs and to reduce OPEX is to evolve the management of the network into a fully autonomic and intelligent framework. ...
ACKNOWLEDGMENT This work was funded by the European Commission Horizon 2020 5G-PPP Programme under Grant Agreement number H2020-ICT-2014-2/671672-SELFNET (Framework for Self-Organized Network Management ...
doi:10.5281/zenodo.2572460
fatcat:fmy5ikudsrgnraacojfp73ns5a
D1.3 - Supercloud Architecture Implementation
2017
Zenodo
Integration between the different layers of the architecture (computing security, data protection, network security) and with the facilities for security self-management is also highlighted. ...
Finally, we provide download and installation instructions for the released software components that can be downloaded from our common SUPERCLOUD code repository. ...
It also provides facilities for security self-management allowing configuration and monitoring of the security of the network and of its components. ...
doi:10.5281/zenodo.836956
fatcat:zmbnf4z2qjarzcjrt4igpqzhpy
D2.3 - Proof-Of-Concept Prototype Of Secure Computation Infrastructure And Supercloud Security Services
2017
Zenodo
support for cross-layer security, hardware-based isolation and trust management using Intel SGX technology, and support for cloud FPGAs; and a self-management infrastructure including a security orchestrator ...
and several security services covering authorization, security monitoring, geolocation-aware replication, SLA management,and software trust management. ...
support for cross-layer security, hardware-based isolation and trust management using Intel SGX technology, and support for cloud FPGAs; • and a self-management infrastructure including a security orchestrator ...
doi:10.5281/zenodo.836962
fatcat:eypxpidvzzbu3ckki4ny3qf6xe
Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)
[chapter]
2014
Lecture Notes in Computer Science
This work presents a Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM). ...
Thereby, TEPANOM defines a scalable network management solution for the Internet of Things, which addresses the security requirements, and allows an easy, and transparent support for the management, which ...
to make the name/locator mapping more secure it can be also considered for this part of the architecture security extensions for DNS, i.e. ...
doi:10.1007/978-3-319-10975-6_11
fatcat:szhiznajsvd37nims75r6m42ka
Reflex Autonomicity in an Agent-Based Security System :: The Autonomic Access Control System
2007
Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07)
Findings are discussed with reference to the use of the JADE agent platform for development. ...
This paper reports on an investigation of the use of the autonomic concepts of reflex autonomicity and apoptosis in the development of a multi-agent system. ...
Acknowledgements The wider context of the Autonomic Systems research is supported at the University of Ulster by the Computer Science Research Institute (CSRI) and the Centre for Software Process Technologies ...
doi:10.1109/ease.2007.22
fatcat:ya44aqiwfbc6dokrtjto2wwfea
Self-aware management of IP networks with QoS guarantees
2004
International Journal of Network Management
Our solution allows the selfconfiguration, self-provisioning and self-monitoring of service as well as the proactive service level agreement management. ...
Self-aware management allows the network to react and to adapt to changes of situation. In this paper an architecture is described for selfaware management of IP networks offering QoS guarantees. ...
The Network Monitoring and Management Level includes a QoS PDP for the provisioning of QoS policy rules and a Monitoring PDP for the provisioning of QoS monitoring policy rules. ...
doi:10.1002/nem.532
fatcat:jm5j4ue3gve4xaq2fdcsdjtpte
« Previous
Showing results 1 — 15 out of 226,797 results