Secure policy audit in shared enforcement environment

作者: Ronald B. Williams , Cheng-Ta Lee

DOI:

关键词: Information security auditEnforcementAuditComputer securityBusinessComponent (UML)Software-defined networkingEvent (computing)

摘要: A method and system are provided that, in turn, provide a secure policy audit shared enforcement environment. The includes providing an auditing component software defined network. further receiving, by the component, first event from network related second also analyzing, against of access criteria for requires events at least two points form points. additionally determining, one compliance non-compliance with criteria.

参考文章(14)
Srinivasa Kakkera, Madhu Gourineni, Inderpal Ricky Arora, Jasvir Singh Gill, Active policy enforcement ,(2012)
Amitkumar M. Paradkar, Matthew A. Markley, Venkata Vinay Parisa, Birgit M. Pfitzmann, Management infrastructure analysis for cloud migration ,(2016)
Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel, Eitan Hadar, Trusted public infrastructure grid cloud ,(2012)
Derek Patton Pearcy, Jessica Jeanne Gaskins, Craig Anthony Phillips, Jessica Anne Heinrich, Integrating security policy and event management ,(2014)
Christian D. Kobsa, Matthew Thaddeus Di Iorio, Sridhar Embar, Gregory Neil Houston, Bryan Douglas Williams, Michael George Nikitaides, System and method for managing security events on a network ,(2001)
Seung Won Shin, Phillip Porras, Vinod Yegneswara, Martin Fong, Guofei Gu, Mabry Tyson, None, FRESCO: Modular Composable Security Services for Software-Defined Networks network and distributed system security symposium. ,(2013)