Adaptive Security Management in SaaS Applications

Author(s):  
Mohamed Almorsy ◽  
Amani Ibrahim ◽  
John Grundy
Author(s):  
Thiago Rodrigues de Oliveira ◽  
Sergio de Oliveira ◽  
Daniel Fernandes Macedo ◽  
Jose Marcos Nogueira

2015 ◽  
Vol 52 ◽  
pp. 139-153 ◽  
Author(s):  
Wei Jiang ◽  
Yue Ma ◽  
Xia Zhang ◽  
Xupeng Wang ◽  
Zili Shao

Author(s):  
Ines Brosso ◽  
Alessandro La Neve

This chapter presents a system for information security management based on adaptative security policy using user’s behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establish the evidences of behavioral trust, interacting with the environment information, so as to keep trust levels updated in a more accurate and faithful way.


Sign in / Sign up

Export Citation Format

Share Document