Scalable model-based configuration management of security services in complex enterprise networks

2010 ◽  
Vol 41 (3) ◽  
pp. 307-338 ◽  
Author(s):  
João Porto de Albuquerque ◽  
Heiko Krumm ◽  
Paulo Lício de Geus ◽  
René Jeruschkat
2013 ◽  
Vol 655-657 ◽  
pp. 1765-1769
Author(s):  
Hong Zou ◽  
Tian Wang ◽  
Li Hao Wei ◽  
Lei Cui

With the rapid expansion of negative information in the Internet, the content rating technology is developed. This paper proposed a rating supervision model based on content rating considering trust model. We firstly analyze the behavior and reputation of network entities from the following dimensions: data dimension, time dimension and application dimension, and then applied artificial neural network to construct the trust model referred to the trust relationship in human society network. At last, we proposed the rating supervision model based on the trust model. It is proved that the rating supervision model can not only meet the standard of PICS, but also take the behavior and reputation of network entities into consideration. As a result, the rating supervision model can provide a variety of security services to enhance the credibility of the information by combination of rating label and network entity reputation.


2014 ◽  
Vol 16 (1) ◽  
pp. 26-32
Author(s):  
Arturs Bartusevics ◽  
Leonids Novickis ◽  
Stefan Leye

Abstract Nowadays software configuration management process is not only dilemma which system should be used for version control or how to merge changes from one source code branch to other. There are multiple tasks such as version control, build management, deploy management, status accounting, bug tracking and many others that should be solved to support full configuration management process according to most popular quality standards. The main scope of the mentioned process is to include only valid and tested software items to final version of product and prepare a new version as soon as possible. To implement different tasks of software configuration management process, a set of different tools, scripts and utilities should be used. The current paper provides a new model-based approach to implementation of configuration management. Using different models, a new approach helps to organize existing solutions and develop new ones by a parameterized way, thus increasing reuse of solutions. The study provides a general description of new model-based conception and definitions of all models needed to implement a new approach. The second part of the paper contains an overview of criteria, practical experiments and lessons learned from using new models in software configuration management. Finally, further works are defined based on results of practical experiments and lessons learned.


2020 ◽  
Vol 77 ◽  
pp. 03002
Author(s):  
Christian Deschner

In times products gain in complexity and variety whereby release and development cycles become even shorter, consistent and systematic variant management is essential not only for technical communication but also for the very most processes in PLM. Therefore, system engineering and system configuration themselves must be leading for a centrally managed, reliable variant management for all PLM processes. We depict how enhanced model-based system engineering approach based on product and product component models can be the enabler for variant management in all PLM processes by specific, explicitly deduced views in different stages of the entire Product Lifecycle.


2007 ◽  
Author(s):  
Gavin Walker ◽  
Jonathan Friedman ◽  
Rob Aberg

2021 ◽  
Author(s):  
Anita Nair

<div>As organizations move most of their workloads to public cloud and remote work becomes more</div><div>prevalent today, enterprise networks become more exposed to threats both from inside and outside</div><div>the organization. The traditional Perimeter Security Model assumes that threats are always from the</div><div>outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and</div><div>software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,</div><div>which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates</div><div>and evaluates the model based on the various implementations by the leading industry players like</div><div>Google and Microsoft.</div>


Sign in / Sign up

Export Citation Format

Share Document