226,797 Hits in 4.3 sec

A self-extension monitoring for security management

Heejin Jang, Sangwood Kim
Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00)  
This paper presents a Self-Extension Monitoring, a new approach in monitoring intruders, securing evidence against hackers and identifying them.  ...  The Self-Extension Monitoring approach minimizes temporal and spatial limitations, making it possible to collect enough information for disclosure of the intruder's identity.  ...  For this reason, this paper proposed the Self-Extension Monitoring using Shadowing Mechanism for Security Management.  ... 
doi:10.1109/acsac.2000.898873 dblp:conf/acsac/JangK00 fatcat:re6oodvfcvcwphdjb4atx2fiui

Towards a Self-Adaptive Data Management System for Cloud Environments

Alexandra Carpen-Amarie
2011 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum  
Self-protection through security policies enforcement: We aim to develop our security framework by introducing a Trust management module, which will dynamically compute a trust value for each user based  ...  For the implementation of this layer, we relied on the MonALISA [10] monitoring system, as it is a reliable and extensible system that allowed us to define specific data to be monitored and stored.  ... 
doi:10.1109/ipdps.2011.381 dblp:conf/ipps/Carpen-Amarie11 fatcat:pvpcpx5ch5bljpca26b6lvx7zi

Autonomic Agents for Survivable Security Systems [chapter]

Roy Sterritt, Grainne Garrity, Edward Hanna, Patricia O'Hagan
2005 Lecture Notes in Computer Science  
This paper examines the relevant technologies including Agents for engineering autonomicity and survivability in a secure location biometric system.  ...  Autonomic Systems are essentially about creating self-managing systems based on the biological metaphor of the non-conscious acting autonomic nervous system.  ...  Acknowledgements The development of this paper was supported by a Knowledge Transfer Partnership project funded by the UK Government's Department of Trade and Industry (DTI).  ... 
doi:10.1007/11596042_125 fatcat:nrbciumvj5dfxjm2xu42u2kgci


Min Zhu, Haibing Guan, Miao Yu, Mingyuan Xia, Bingyu Li, Peijie Yu, Shang Gao, Zhengwei Qi, Liang Liu, Ying Chen
2011 Proceedings of the 2011 ACM Symposium on Applied Computing - SAC '11  
Our design is targeted at establishing a security monitor which resides completely outside of the target OS environment with a negligible overhead.  ...  This paper presents VASP, a hypervisor based monitor which allows a trusted execution environment to monitor various malicious behaviors in the operating system.  ...  This memory management service realizes the memory selftransparency strategy for the self-protection of the hypervisor.  ... 
doi:10.1145/1982185.1982305 dblp:conf/sac/ZhuYXLYGQLCG11 fatcat:eiwqynemurea7lh4d7qvfyutlm

Real-Time Intruder Tracing through Self-Replication [chapter]

Heejin Jang, Sangwook Kim
2002 Lecture Notes in Computer Science  
Existing real-time intruder tracing systems has a spatial restriction. The security domain remains unchanged if there is no system security officer's intervention after installing the tracing system.  ...  It is impossible to respond to an attack which is done out of the security domain.  ...  Monitoring activity is indispensable for security management. Monitoring is classified into two types, system state monitoring and change monitoring [7] .  ... 
doi:10.1007/3-540-45811-5_1 fatcat:6aacttpffzbajnm5du2c2gvvwy

D1.4 - Supercloud Self-Management Of Security Implementation

Reda Yaich, Nora Cuppens, Frédéric Cuppens, Marc Lacoste, Sébastien Canard, Alysson Bessani, Fernando Ramos, Nuno Neves, Krzysztof Oborzynski, Daniel Pletea, Marko Vukolic
2017 Zenodo  
This Deliverable describes the implementation of the SUPERCLOUD Security Self-Management Framework.  ...  Finally, we showcase the integration of Security Self-Management with SUPERCLOUD project use-cases demonstrators (i.e., Philips Imaging Platform).  ...  This illustrates the complete integration of Security Self-Management with SUPERCLOUD project use-case scenarios.  ... 
doi:10.5281/zenodo.836958 fatcat:etiyhn3p6vavpe45dtymllywhi


2009 Journal of Engineering Science and Technology  
Distributability, second response, and self recovery, are the hallmarks of the proposed security model which put a consideration on high nodes mobility.  ...  Besides, each node is a possible part of the essential support infrastructure, cooperate with each other to make basic communication services available.  ...  A protocol for securing mobile ad hoc networks based on the proposed architecture will be implemented.  ... 
doaj:9cfa90dcca2040aaa7f85864176cb2fd fatcat:ptlckaar6vbhfpo7g6vyygrdtq

Supercloud Self-Management Of Security Specification

Reda Yaich, Sabir Idrees, Nora Cuppens, Frédéric Cuppens
2015 Zenodo  
In this document, we present a preliminary architecture of SUPERCLOUD security self-management.  ...  We first identify and describe the design requirements of the user-centric self-management of multiclouds security.  ...  For such decisions, an additional "location monitoring sensor" would provide input to the self-managent manager.  ... 
doi:10.5281/zenodo.49741 fatcat:pxpw6e4uw5c4hpdyz6wjyehbqq

Page 1160 of Management & Marketing Abstracts Vol. 31, Issue 8 [page]

2006 Management & Marketing Abstracts  
Every two years the DTI surveys a thousand companies to see how they are managing security.  ...  A table has been devised that sets out potential areas of knowledge worker self monitoring in various enterprise integration system modules. (3 fig, | tab, 27 ref) 2289 Security in a changing world: beating  ... 

The SELFNET approach to Self-Protection through Autonomic Network Management

Maria Joao Barros Weiss, Anastasius Gavras, Gregorio Martinez Perez, Manuel Gil Pérez, Qi Wang, Jose Alcaraz-Calero, Pedro Neves, Rui Calé
2016 Zenodo  
others to provide self-protection capabilities for detecting and mitigating potential cyber-attacks.  ...  A contribution to meeting the KPIs and to reduce OPEX is to evolve the management of the network into a fully autonomic and intelligent framework.  ...  ACKNOWLEDGMENT This work was funded by the European Commission Horizon 2020 5G-PPP Programme under Grant Agreement number H2020-ICT-2014-2/671672-SELFNET (Framework for Self-Organized Network Management  ... 
doi:10.5281/zenodo.2572460 fatcat:fmy5ikudsrgnraacojfp73ns5a

D1.3 - Supercloud Architecture Implementation

Markus Miettinen, Mario Münzer, Marc Lacoste, Sébastien Canard, Marie Paindavoine, Alysson Bessani, Fernando Ramos, Nuno Neves, Tommaso Frassetto, Daniel Pletea
2017 Zenodo  
Integration between the different layers of the architecture (computing security, data protection, network security) and with the facilities for security self-management is also highlighted.  ...  Finally, we provide download and installation instructions for the released software components that can be downloaded from our common SUPERCLOUD code repository.  ...  It also provides facilities for security self-management allowing configuration and monitoring of the security of the network and of its components.  ... 
doi:10.5281/zenodo.836956 fatcat:zmbnf4z2qjarzcjrt4igpqzhpy

D2.3 - Proof-Of-Concept Prototype Of Secure Computation Infrastructure And Supercloud Security Services

Marc Lacoste, Mario Münzer, Felix Stornig, Alex Palesandro, Denis Bourge, Charles Henrotte, Houssem Kanzari, Marko Vukolic, Jagath Weerasinghe, Reda Yaich, Nora Cuppens, Frédéric Cuppens (+4 others)
2017 Zenodo  
support for cross-layer security, hardware-based isolation and trust management using Intel SGX technology, and support for cloud FPGAs; and a self-management infrastructure including a security orchestrator  ...  and several security services covering authorization, security monitoring, geolocation-aware replication, SLA management,and software trust management.  ...  support for cross-layer security, hardware-based isolation and trust management using Intel SGX technology, and support for cloud FPGAs; • and a self-management infrastructure including a security orchestrator  ... 
doi:10.5281/zenodo.836962 fatcat:eypxpidvzzbu3ckki4ny3qf6xe

Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM) [chapter]

Antonio J. Jara
2014 Lecture Notes in Computer Science  
This work presents a Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM).  ...  Thereby, TEPANOM defines a scalable network management solution for the Internet of Things, which addresses the security requirements, and allows an easy, and transparent support for the management, which  ...  to make the name/locator mapping more secure it can be also considered for this part of the architecture security extensions for DNS, i.e.  ... 
doi:10.1007/978-3-319-10975-6_11 fatcat:szhiznajsvd37nims75r6m42ka

Reflex Autonomicity in an Agent-Based Security System :: The Autonomic Access Control System

Sarah Eowyn Johnston, Roy Sterritt, Edward Hanna, Patricia O'Hagan
2007 Fourth IEEE International Workshop on Engineering of Autonomic and Autonomous Systems (EASe'07)  
Findings are discussed with reference to the use of the JADE agent platform for development.  ...  This paper reports on an investigation of the use of the autonomic concepts of reflex autonomicity and apoptosis in the development of a multi-agent system.  ...  Acknowledgements The wider context of the Autonomic Systems research is supported at the University of Ulster by the Computer Science Research Institute (CSRI) and the Centre for Software Process Technologies  ... 
doi:10.1109/ease.2007.22 fatcat:ya44aqiwfbc6dokrtjto2wwfea

Self-aware management of IP networks with QoS guarantees

Francine Krief
2004 International Journal of Network Management  
Our solution allows the selfconfiguration, self-provisioning and self-monitoring of service as well as the proactive service level agreement management.  ...  Self-aware management allows the network to react and to adapt to changes of situation. In this paper an architecture is described for selfaware management of IP networks offering QoS guarantees.  ...  The Network Monitoring and Management Level includes a QoS PDP for the provisioning of QoS policy rules and a Monitoring PDP for the provisioning of QoS monitoring policy rules.  ... 
doi:10.1002/nem.532 fatcat:jm5j4ue3gve4xaq2fdcsdjtpte
« Previous Showing results 1 — 15 out of 226,797 results