Policy enforcement point model

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs and PEPs, both in terms of coverage, dependencies and scope. In this paper, we focus on Policy Enforcement Points to model the objects on which they may enforce security constraints. This model, called the PEP Responsibility Domain (RD(PEP)), is build based on the configuration of the PEP following a bottom-up approach. This model can then be applied to multiple use cases, three of them are shown as examples in this paper, including policy evaluation and intrusion detection assessment and alert correlation.

Original languageEnglish
Title of host publicationLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
PublisherSpringer Verlag
Pages278-286
Number of pages9
DOIs
Publication statusPublished - 1 Jan 2015
Externally publishedYes

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume152
ISSN (Print)1867-8211

Keywords

  • Alert correlation
  • Approximation Accuracy
  • Policy Enforcement Point
  • Security policy

Fingerprint

Dive into the research topics of 'Policy enforcement point model'. Together they form a unique fingerprint.

Cite this