Title :
Threat-adaptive security policy
Author :
Venkatesan, Ramkumar M. ; Bhattacharya, Sourav
Author_Institution :
Dept. of Electr. & Comput. Eng., Arizona State Univ., Tempe, AZ, USA
Abstract :
Secure systems have traditionally paid little attention to performance. This is because current secure systems apply a uniform and statically decided upon security policy to each user and do not associate an individualized level of trust with each user at run-time. This paper describes a new framework of threat and performance driven security. A threat-adaptive model which enforces a dynamic and individualized security policy mechanism, with a trust state machine capturing the different security levels is proposed. This paper discusses a threat-adaptive firewall designed for an EC application, which adaptively varies the security constraints for each user, thereby improving the system performance
Keywords :
authorisation; finite state machines; security of data; software performance evaluation; EC application; intrusion detection; performance; run-time; threat-adaptive firewall; threat-adaptive security policy; trust state machine; Computer science; Computer security; Delay; Information security; Intrusion detection; Military computing; National security; Protection; Runtime; System performance;
Conference_Titel :
Performance, Computing, and Communications Conference, 1997. IPCCC 1997., IEEE International
Conference_Location :
Phoenix, Tempe, AZ
Print_ISBN :
0-7803-3873-1
DOI :
10.1109/PCCC.1997.581559