Research Article
Policy Enforcement Point Model
462 downloads
@INPROCEEDINGS{10.1007/978-3-319-23829-6_20, author={Yosra Ben Mustapha and Herv\^{e} Debar and Gregory Blanc}, title={Policy Enforcement Point Model}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Policy Enforcement Point Approximation Accuracy Alert correlation Security policy}, doi={10.1007/978-3-319-23829-6_20} }
- Yosra Ben Mustapha
Hervé Debar
Gregory Blanc
Year: 2015
Policy Enforcement Point Model
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_20
Abstract
As information systems become more complex and dynamic, Policy Decision Points (PDPs) and Policy Enforcement Points (PEPs) follow the same trend. It becomes thus increasingly important to model the capabilities of these PDPs and PEPs, both in terms of coverage, dependencies and scope.
Copyright © 2014–2024 ICST