International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Policy Enforcement Point Model

Download
321 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_20,
        author={Yosra Ben Mustapha and Herv\^{e} Debar and Gregory Blanc},
        title={Policy Enforcement Point Model},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Policy Enforcement Point Approximation Accuracy Alert correlation Security policy},
        doi={10.1007/978-3-319-23829-6_20}
    }
    
  • Yosra Ben Mustapha
    Hervé Debar
    Gregory Blanc
    Year: 2015
    Policy Enforcement Point Model
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_20
Yosra Ben Mustapha1,*, Hervé Debar1,*, Gregory Blanc1,*
  • 1: Telecom Sudparis, SAMOVAR UMR 5157
*Contact email: yosra.ben_mustapha@telecom-sudparis.eu, herve.debar@telecom-sudparis.eu, gregory.blanc@telecom-sudparis.eu

Abstract

As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs and PEPs, both in terms of coverage, dependencies and scope.