Autonomic Protection System Using Adaptive Security Policy

Author(s):  
Sihn-hye Park ◽  
Wonil Kim ◽  
Dong-kyoo Kim
Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 238
Author(s):  
Christos Grigoriadis ◽  
Romain Laborde ◽  
Antonin Verdier ◽  
Panayiotis Kotzanikolaou

Maritime processes involve actors and systems that continuously change their underlying environment, location and threat exposure. Thus, risk mitigation requires a dynamic risk assessment process, coupled with an adaptive, event driven security enforcement mechanism, to efficiently deal with dynamically evolving risks in a cost efficient manner. In this paper, we propose an adaptive security framework that covers both situational risk assessment and situational driven security policy deployment. We extend MITIGATE, a maritime-specific risk assessment methodology, to capture situations in the risk assessment process and thus produce fine-grained and situation-specific, dynamic risk estimations. Then, we integrate DynSMAUG, a situation-driven security management system, to enforce adaptive security policies that dynamically implement security controls specific to each situation. To validate the proposed framework, we test it based on maritime cargo transfer service. We utilize various maritime specific and generic systems employed during cargo transfer, to produce dynamic risks for various situations. Our results show that the proposed framework can effectively assess dynamic risks per situation and automate the enforcement of adaptive security controls per situation. This is an important improvement in contrast to static and situation-agnostic risk assessment frameworks, where security controls always default to worst-case risks, with a consequent impact on the cost and the applicability of proper security controls.


Author(s):  
Yevhen Plisko ◽  
◽  
Violetta Tsokalo ◽  
◽  

The article analyzes the activities of the social protection system and social services of Ukraine. The concept of «social protection» is defined, the classification of the social protection system according to the models of social policy of other countries (Austria, England, Germany, USA, France, Japan) is given. The only principle of social protection according to the given models is formulated – joint action of a complex of measures which are directed on increase of well-being and quality of life of the population (economic, household, social). The socially-oriented policy of Ukraine, which is aimed at overcoming poverty, introduction of social insurance and targeted assistance, solving problems related to unemployment, is indicated. It was found that the basic state social standard in the field of income is the subsistence level. The social service is defined as a multifunctional state executive body that acts as a guarantor in ensuring the stability of the functioning of the system of social protection and social security of socially vulnerable groups. It is established that social services are an organizational form of social work, because they implement the practice of social security. Ensure orderly communication and interaction of all social work bodies (departments and social services). The organizational structure of the social security system is an orderly connection and interaction of all bodies of social work (departments and social services), which provide general conditions for rational organization and normal functioning of the support system for individuals, groups of communities at risk of social risk. The leading direction in social security is to support a person who finds himself in a difficult life situation at the minimum (not lower) social and household level – the provision of cash benefits, social benefits, benefits, subsidies and more.


Author(s):  
Jianfeng Ma ◽  
Changguang Wang ◽  
Zhuo Ma

Author(s):  
Ines Brosso ◽  
Alessandro La Neve

This chapter presents a system for information security management based on adaptative security policy using user’s behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establish the evidences of behavioral trust, interacting with the environment information, so as to keep trust levels updated in a more accurate and faithful way.


2000 ◽  
Author(s):  
Erika Felix ◽  
Anjali T. Naik-Polan ◽  
Christine Sloss ◽  
Lashaunda Poindexter ◽  
Karen S. Budd

Sign in / Sign up

Export Citation Format

Share Document