Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration 2010
DOI: 10.1145/1866898.1866903
|View full text |Cite
|
Sign up to set email alerts
|

Management of heterogeneous security access control configuration using an ontology engineering approach

Abstract: Management of heterogeneous enterprise security mechanisms is complex and requires a security administrator to have deep knowledge of each security mechanism's configuration. Effective configuration may be hampered by poor understanding and/or management of the enterprise security policy which, in turn, may unnecessarily expose the enterprise to known threats. This paper argues that knowledge about detailed security configuration, enterprise-level security requirements including best practice recommendations a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 22 publications
0
14
0
Order By: Relevance
“…In [21], [22], ontologies have been shown to be effective at modelling and reasoning about low-level systems security configurations (for example [21], [22]). Thus, we argue an ontology engineering approach to encode existing low-level SCAP repository information is practical.…”
Section: F Non-ambiguous Definition Namesmentioning
confidence: 99%
“…In [21], [22], ontologies have been shown to be effective at modelling and reasoning about low-level systems security configurations (for example [21], [22]). Thus, we argue an ontology engineering approach to encode existing low-level SCAP repository information is practical.…”
Section: F Non-ambiguous Definition Namesmentioning
confidence: 99%
“…An ontology provides a conceptual and formal model of a domain of interest. Ontologies are developed for infrastructure-level access-control mechanisms [2] (Linux iptables and TCP-Wrapper firewalls) and applicationlevel access-control mechanisms [3] (Openfire and Ejabbered XMPP servers).…”
Section: Approachmentioning
confidence: 99%
“…Ontologies for best practice standards for firewalls, Email servers, Web servers and XMPP servers, are developed [2], [3]. For example, XEP-0205 [4] and NIST SP800-123 [5] recommend multiple countermeasures such as connection throttling that mitigate against the threat of Denial of Service, when hosting an XMPP server.…”
Section: Approachmentioning
confidence: 99%
“…This paper builds on previous firewall centric research [3]- [5] to model and reason about SAN switch security configurations.…”
Section: Related Researchmentioning
confidence: 99%
“…A formal model for switch security configuration is developed using Description Logic [2]. This approach builds on previous research [3]- [5] that demonstrated the effectiveness of using Description Logic to model and reason about firewall rules.…”
Section: Introductionmentioning
confidence: 99%