2017
DOI: 10.1007/978-3-319-61437-3_3
|View full text |Cite
|
Sign up to set email alerts
|

A Security Policy Infrastructure for Tactical Service Oriented Architectures

Abstract: Abstract. Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant limitations to the functionalities and efficiency of current generic security policy frameworks. Earlier studies have provided a risk analysis of tactical service oriented architectures (SOA), and a set of fine-grained protection goals in correspondence to the aforementioned constraint… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…According to the results of our experiments, it is important to note that the complexity and dynamic adaptability of the developed mechanism is situated at the structure of the ontological knowledge base, the governing policy rules, the fine grained definition of action requests and the detailed incorporation of the available semantics, as described earlier [6,5,7,8,3]. Contrary to that, the functionalities of the presented core security services are kept at a low complexity level aiming for clear separation of duties within the policy decision extraction process.…”
Section: Test Case Based Validationmentioning
confidence: 86%
See 2 more Smart Citations
“…According to the results of our experiments, it is important to note that the complexity and dynamic adaptability of the developed mechanism is situated at the structure of the ontological knowledge base, the governing policy rules, the fine grained definition of action requests and the detailed incorporation of the available semantics, as described earlier [6,5,7,8,3]. Contrary to that, the functionalities of the presented core security services are kept at a low complexity level aiming for clear separation of duties within the policy decision extraction process.…”
Section: Test Case Based Validationmentioning
confidence: 86%
“…In this section we present these components (Figure 1), aiming to highlight the processes involved in the extraction of suitable policy decisions (Figures 2 and 3). It must be noted that the security policy framework developed within TACTICS for the accommodation of the requirements imposed by contemporary tactical SOA, has been presented earlier in detail [6] and is outside the scope of this article.…”
Section: Tactics Security Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…Hence, the Current Value Matrices corresponding to the two subjects are respectively CV A = [5,5,4,1] and CV B = [6,8,4,7]. The same normalization technique and the same weights are applied also to these matrices as denoted in Equation ( 4).…”
Section: An Example Use Casementioning
confidence: 99%
“…Moreover, the fact that the edge nodes generally present substantial constraints, in terms related to the size of memory and buffers, computational power, battery life and available interfaces [2], can also be an obstruction in the policy enforcement. Thus, protecting and regulating access over the data, as mentioned above, becomes a challenging task [5][6][7][8]. Managing security policies in such an environment requires an effective and efficient access control mechanism to be in place in order to provide suitable monitoring, control and audit solutions for managing data flows across communication and control links but also access to services.…”
Section: Introductionmentioning
confidence: 99%