Enabling automated threat response through the use of a dynamic security policy
- 30 March 2007
- journal article
- Published by Springer Science and Business Media LLC in Journal of Computer Virology and Hacking Techniques
- Vol. 3 (3), 195-210
- https://doi.org/10.1007/s11416-007-0039-z
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Using Contextual Security Policies for Threat ResponseLecture Notes in Computer Science, 2006
- Selecting appropriate counter-measures in an intrusion detection frameworkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Modelling contexts in the Or-BAC modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Organization based access controlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Cyber-intrusion responsePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Security agility in response to intrusion detectionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Adaptation techniques for intrusion detection and intrusion response systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- M2D2: A Formal Data Model for IDS Alert CorrelationLecture Notes in Computer Science, 2002
- Role-based access control modelsComputer, 1996
- Protection in operating systemsCommunications of the ACM, 1976