TY - GEN
T1 - Service dependencies in information systems security
AU - Debar, Hervé
AU - Kheir, Nizar
AU - Cuppens-Boulahia, Nora
AU - Cuppens, Frédéric
PY - 2010/1/1
Y1 - 2010/1/1
N2 - In the complex world of information services, we are realizing that system dependencies upon one another have not only operational implications but also security implications. These security implications are multifold. Beyond allowing an attacker to propagate over an information system by leveraging stepping stones vulnerabilities, it also allows a defender to select the most interesting enforcement points for its policies, overall reducing the cost of managing the security of these complex systems. In this paper, we present a dependency model that has been designed for the purpose of providing security operators with a quantitative decision support system for deploying and managing security policies.
AB - In the complex world of information services, we are realizing that system dependencies upon one another have not only operational implications but also security implications. These security implications are multifold. Beyond allowing an attacker to propagate over an information system by leveraging stepping stones vulnerabilities, it also allows a defender to select the most interesting enforcement points for its policies, overall reducing the cost of managing the security of these complex systems. In this paper, we present a dependency model that has been designed for the purpose of providing security operators with a quantitative decision support system for deploying and managing security policies.
UR - https://www.scopus.com/pages/publications/78649301406
U2 - 10.1007/978-3-642-14706-7_1
DO - 10.1007/978-3-642-14706-7_1
M3 - Conference contribution
AN - SCOPUS:78649301406
SN - 3642147054
SN - 9783642147050
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 20
BT - Computer Network Security - 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, Proceedings
PB - Springer Verlag
ER -