An approach for deploying and monitoring dynamic security policies.

dc.centroE.T.S.I. Informáticaes_ES
dc.contributor.authorHorcas-Aguilera, José Miguel
dc.contributor.authorPinto-Alarcón, Mónica
dc.contributor.authorFuentes-Fernández, Lidia
dc.contributor.authorMallouli, Wissam
dc.contributor.authorMontes de Oca, Edgardo
dc.date.accessioned2024-09-19T12:05:29Z
dc.date.available2024-09-19T12:05:29Z
dc.date.issued2016-05
dc.departamentoLenguajes y Ciencias de la Computación
dc.descriptionPolítica de acceso abierto tomada de: https://v2.sherpa.ac.uk/id/publication/27894?template=romeoes_ES
dc.description.abstractSecurity policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed within the applications must be adapted at runtime in order to enforce the new security policies. INTER-TRUST is a framework for the specification, negotiation, deployment and dynamic adaptation of interoperable security policies, in the context of pervasive systems where devices are constantly exchanging critical information through the network. The dynamic adaptation of the security policies at runtime is addressed using Aspect-Oriented Programming (AOP) that allows enforcing security requirements by dynamically weaving security aspects into the applications. However, a mechanism to guarantee the correct adaptation of the functionality that enforces the changing security policies is needed. In this paper, we present an approach based on the combination of monitoring and detection techniques in order to maintain the correlation between the security policies and the associated functionality deployed using AOP, allowing the INTER-TRUST framework to automatically react when needed.es_ES
dc.identifier.citationJose-Miguel Horcas, Mónica Pinto, Lidia Fuentes, Wissam Mallouli, Edgardo Montes de Oca, An approach for deploying and monitoring dynamic security policies, Computers & Security, Volume 58, 2016, Pages 20-38, ISSN 0167-4048, https://doi.org/10.1016/j.cose.2015.11.007.es_ES
dc.identifier.doi10.1016/j.cose.2015.11.007
dc.identifier.urihttps://hdl.handle.net/10630/32683
dc.language.isoenges_ES
dc.publisherElsevieres_ES
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional
dc.rights.accessRightsopen accesses_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectProgramación de ordenadoreses_ES
dc.subjectSeguridad informáticaes_ES
dc.subject.otherAspect-oriented programminges_ES
dc.subject.otherDynamic deploymentes_ES
dc.subject.otherSecurity frameworkes_ES
dc.subject.otherSecurity policieses_ES
dc.subject.otherMonitoringes_ES
dc.titleAn approach for deploying and monitoring dynamic security policies.es_ES
dc.typejournal articlees_ES
dc.type.hasVersionAMes_ES
dspace.entity.typePublication
relation.isAuthorOfPublicationf4aaacf9-21d1-47d4-a612-4fa9db809696
relation.isAuthorOfPublication839f00c1-d583-4eeb-bb1e-d529b1df6967
relation.isAuthorOfPublication431c7076-c749-483c-8fd6-b9c18bf33a13
relation.isAuthorOfPublication.latestForDiscoveryf4aaacf9-21d1-47d4-a612-4fa9db809696

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
cs2016.pdf
Size:
598.83 KB
Format:
Adobe Portable Document Format
Description:
Artículo
Download

Description: Artículo

Collections