dc.creatorALBUQUERQUE, Joao Porto de
dc.creatorKRUMM, Heiko
dc.creatorGEUS, Paulo Licio de
dc.creatorJERUSCHKAT, Rene
dc.date.accessioned2012-10-20T03:36:10Z
dc.date.accessioned2018-07-04T15:38:52Z
dc.date.available2012-10-20T03:36:10Z
dc.date.available2018-07-04T15:38:52Z
dc.date.created2012-10-20T03:36:10Z
dc.date.issued2011
dc.identifierSOFTWARE-PRACTICE & EXPERIENCE, v.41, n.3, p.307-338, 2011
dc.identifier0038-0644
dc.identifierhttp://producao.usp.br/handle/BDPI/28987
dc.identifier10.1002/spe.1014
dc.identifierhttp://dx.doi.org/10.1002/spe.1014
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/1625629
dc.description.abstractSecurity administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.
dc.languageeng
dc.publisherWILEY-BLACKWELL
dc.relationSoftware-practice & Experience
dc.rightsCopyright WILEY-BLACKWELL
dc.rightsclosedAccess
dc.subjectnetwork security policy
dc.subjectpolicy-based management
dc.subjectautomated policy refinement
dc.titleScalable model-based configuration management of security services in complex enterprise networks
dc.typeArtículos de revistas


Este ítem pertenece a la siguiente institución