Al-Shaer, Ehab
Automated Security Management
Part I. Configuration Modeling and Checking
1. Towards a Unified Modeling and Verification of Network and System Security Configurations
Mohammed Noraden Alsaleh, Ehab Al-Shaer, Adel El-Atawy
2. Modeling and Checking the Security of DIFC System Configurations
Mingyi Zhao, Peng Liu
Part II. Vulnerability and Risk Assessment
3. Increasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework
Martín Barrère, Gaëtan Hurel, Rémi Badonnel, Olivier Festor
4. A Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure
Mohammad Ashiqur Rahman, Ehab Al-Shaer
5. Risk Based Access Control Using Classification
Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq
Part III. Configuration Analytics
6. GCNav: Generic Configuration Navigation System
Shankaranarayanan Puzhavakath Narayanan, Seungjoon Lee, Subhabrata Sen
7. The Right Files at the Right Time
Hayawardh Vijayakumar, Trent Jaeger
8. Rule Configuration Checking in Secure Cooperative Data Access
Meixing Le, Krishna Kant, Sushil Jajodia
Part IV. Diagnostics and Discovery
9. Programmable Diagnostic Network Measurement with Localization and Traffic Observation
Michael R. Clement, Dennis Volpano
10. Discovery of Unexpected Services and Communication Paths in Networked Systems
Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto
11. Tracing Advanced Persistent Threats in Networked Systems
Masahiko Kato, Takumi Matsunami, Akira Kanaoka, Hiroshi Koide, Eiji Okamoto
Avainsanat: Computer Science, Systems and Data Security, Data Encryption, Computer Communication Networks
- Tekijä(t)
- Al-Shaer, Ehab
- Ou, Xinming
- Xie, Geoffrey
- Julkaisija
- Springer
- Julkaisuvuosi
- 2013
- Kieli
- en
- Painos
- 2013
- Sivumäärä
- 8 sivua
- Kategoria
- Tietotekniikka, tietoliikenne
- Tiedostomuoto
- E-kirja
- eISBN (PDF)
- 9783319014333