Online compliance monitoring of service landscapes

6Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today, it is a challenging task to keep a service application running over the internet safe and secure. Based on a collection of security requirements, a so-calledgolden configurationcan be created for such an application. When the application has been configured according to this golden configuration, it is assumed that it satisfies these requirements, that is, that it is safe and secure. This assumption is based on the best practices that were used for creating the golden configuration, and on assumptions like that nothing out-of-the-ordinary occurs. Whether the requirements are actually violated, can be checked on the traces that are left behind by the configured service application. Today’s applications typicallyloganenormousamountofdatatokeeptrackofeverythingthat has happened. As such, such an event log can be regarded as the ground truth for the entire application: A security requirement is violated if and only if it shows in the event log. This paper introduces the ProMSecCo tool, which has been built to check whether the security requirements that have been used to create the golden configuration are violated by the event log as generated by the configured service application.

Cite

CITATION STYLE

APA

van der Werf, J. M. E. M., & Verbeek, H. M. W. (2015). Online compliance monitoring of service landscapes. In Lecture Notes in Business Information Processing (Vol. 202, pp. 89–95). Springer Verlag. https://doi.org/10.1007/978-3-319-15895-2_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free