Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2019 | 51 | 2(192) | 321-334

Article title

Solving problems relating to ICT security management systems including various characteristics of the environment and system

Content

Title variants

PL
Rozwiązywanie problemów z zarządzaniem bezpieczeństwem systemów teleinformatycznych z uwzględnieniem zmiennej charakterystyki środowiska i systemu

Languages of publication

Abstracts

PL
W pracy została zaprezentowana istota problemów pojawiających się w procesie zarządzania bezpieczeństwem teleinformatycznym w kontekście systemów charakteryzujących się znaczącą dynamiką konfiguracji oraz heterogenicznością zasobów zarówno w warstwie sprzętowej, jak i programowej. Przedstawiono podstawowe różnice w zarządzaniu bezpieczeństwem w systemach o tradycyjnej scentralizowanej i monolitycznej architekturze oraz w systemach o architekturze zorientowanej na usługi. Przedstawiono warstwowy model odniesienia dla systemów zorientowanych na usługi, z uwzględnieniem którego zdefiniowane zostały podstawowe cele bezpieczeństwa teleinformatycznego dla dynamicznych systemów informatycznych. Omówiono podstawowe założenia wieloagentowego systemu analizy bezpieczeństwa teleinformatycznego w systemach zorientowanych na usługi oraz przedstawiono wyniki analizy bezpieczeństwa z uwzględnieniem korelacji pomiędzy zdarzeniami obserwowanymi w niskich i w wysokich warstwach modelu odniesienia.
EN
The work presents the essence of problems appearing in the ICT security management process in the context of systems characterized by significant dynamics of configuration and heterogeneity of resources both in the hardware and software layer. Basic differences in security management in systems with traditional centralized and monolithic architecture as well as in systems with service-oriented architecture have been presented. A layered reference model for service-oriented systems taking account of the basic goals of ICT security for dynamic information systems has been discussed. The basic assumptions of the multi-agent ICT security analysis system in service-oriented systems as well as the results of the safety analysis, including the correlation between events observed in low and high layers of the reference model have been discussed.

Year

Volume

51

Issue

Pages

321-334

Physical description

Dates

published
2019

Contributors

  • Faculty of Management, General Tadeusz Kosciuszko Military University of Land Forces, Wroclaw, Poland
  • Department of Computer Science, Faculty of Computer Science and Management, Wroclaw University of Technology, Poland
  • Department of Computer Science, Faculty of Computer Science and Management, Wroclaw University of Technology, Poland

References

  • Harris B, Hunt R. TCP/IP security threats and attack methods. Computer Communications. 1999;22(10):885-97.
  • Dlamini MT, Eloff JHP, Eloff MM. Information security: The moving target. Computers & Security. 2009;28(3-4):189-98.
  • DRAFT Special Publication 800-160, Systems Security Engineering: An Integrated Approach to Building Trustworthy Resilient Systems – sp800_160_draft.pdf. (n.d.). Retrieved November 6, 2015.
  • Conti M, Chong S, Fdida S, et al. Research challenges towards the Future Internet. Computer Communications. 2011;34(18):2115-34.
  • Chen Y, Paxson V, Katz RH. What’s New About Cloud Computing Security? University of California, Berkeley Report No. UCB/EECS-2010-5 January. 2010;20(2010):1-8.
  • Rahman NHA, Choo K-KR. A survey of information security incident handling in the cloud. Computers & Security. 2014;49:45-69.
  • Gasser M. Building a secure computer system. New York: Van Nostrand Reinhold Company New York; 1988.
  • Pfitzmann B, Waidner M. A general framework for formal notions of “secure” systems. Hildesheim: Universität Hildesheim, Institut für Informatik; 1994.
  • Harmening JT. Security Management Systems. In: Vacca J (ed.). Managing Information Security. Waltham: Elsevier; 2014:47-55.
  • Introduction to Computer and Network Security. Network Security. 2013;11.
  • Chneider D. The state of network security. Network Security. 2012;2:14-20.
  • Benson GS, Akyildiz IF, Appelbe WF. A formal protection model of security in centralized, parallel, and distributed systems. ACM Transactions on Computer Systems. 1990;8(3):183-213.
  • Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. In: Proceedings of the 5th ACM conference on Computer and communications security – CCS ’98. New York: ACM Press; 1998:83-92.
  • Papazoglou MP, Traverso P, Dustdar S, Leymann F. Service-oriented computing: State of the art and research challenges. Computer. 2007;40(11):38-45.
  • Security, S.O.A. SOA Security. Information Sciences. 2008.
  • Brotby K. Information Security Governance. John Wiley & Sons; 2009.
  • Pipkin DL. Information security: protecting the global enterprise. Upper Saddle River, NJ: Prentice Hall PTR; London: Prentice-Hall International; 2000.
  • Gambetta D. Can We Trust Trust? In: Gambetta D (ed.). Trust: Making and Breaking Cooperative Relations. Oxford: University of Oxford; 2000:213-37.
  • Kolaczek G. Multi-agent platform for security level evaluation of information and communication services. In: Nguyen NT, Trawinski B, Katarzyniak R, Jo G-S (eds.). Advanced Methods for Computational Collective Intelligence. Berlin, Heidelberg: Springer; 2013:107-16.
  • Kolaczek G, Juszczyszyn K. Smart security assessment of composed Web services. Cybernetics and Systems: An International Journal. 2010;41(1):46-61.
  • Kolaczek G. Spatial Analysis Based Method For Detection Of Data Traffic Problems In Computer Networks. Uncertainty Modeling in Knowledge Engineering and Decision Making. 2012:919-24. https://doi.org/10.1142/9789814417747_0147.
  • Kolaczek G, Juszczyszyn K, Swiatek P, et al. Trust‐based security‐level evaluation method for dynamic service‐oriented environments. Concurrency and Computation: Practice and Experience. 2015;27(18):5700-5718.

Document Type

Publication order reference

Identifiers

Biblioteka Nauki
30146041

YADDA identifier

bwmeta1.element.ojs-doi-10_5604_01_3001_0013_2607
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.