Constraint analysis for security policy partitioning over tactical service oriented architectures

2Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Tactical networks are typically of an ad-hoc nature operating in highly restricted environments and constrained resources. The frequent presence of communication disruptions and network partitioning must also be expected and managed, while core functionalities must be maintained, providing asynchronous invocation and access to services in a distributed manner. Supporting the required functionalities of the contemporary tactical environment, requires the dynamic evaluation of security policies, incorporating semantic knowledge from various network layers, together with facts and rules that are defined axiomatically a priori. However, the required basis for such policy decisions can be excessively extended and dynamic. Thus, it is desirable to locally minimize the scope of the policy maximizing efficiency. In this paper, we therefore analyze criteria and optimization goals for the a priori distribution and partitioning of security policies, ensuring the continuous support of the required capabilities, given the operational tasks of each deployed actor.

Cite

CITATION STYLE

APA

Gkioulos, V., & Wolthusen, S. D. (2017). Constraint analysis for security policy partitioning over tactical service oriented architectures. Advances in Intelligent Systems and Computing, 461, 149–166. https://doi.org/10.1007/978-3-319-44354-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free