Abstract. Security policy conformance is a crucial issue in large-scale critical cyber-infrastructure. The complexity of these systems, insider attacks, and the possible speed of an attack on a system necessitate an automated approach to assure a basic level of protection. This paper presents Odessa, a resilient system for monitoring and validating compliance of networked systems to complex policies. To man-age the scale of infrastructure systems and to avoid single points of fail-ure or attack, Odessa distributes policy validation across many network nodes. Partial delegation enables the validation of component policies and of liveness at the edge nodes of the network using redundancy to in-crease security. Redundant distributed servers ag...
Abstract: The complexity of today’s networks can only be handled by the use of more and more sophist...
Abstract—Many critical activities rely on the correct and uninterrupted operation of networked Compu...
Nowadays, cyber attacks constitute a bigger threat to organizations than before, given the higher so...
Modern computing environments involve a multitude of components working in concert to provide servic...
Policies are used extensively in managing the security of large computer infrastructure systems. Ma...
The design principle of restricting local autonomy only where necessary for global robustness has le...
AbstractWe introduce a mechanism for the verification of real-time integrity policies about the oper...
We introduce a mechanism for the verification of real-time integrity policies about the operation of...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract. Security management and maintenance are difficult in a large scale network because there a...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
Security Policies constitute the core of network protection infrastructures. However, their developm...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Abstract: The complexity of today’s networks can only be handled by the use of more and more sophist...
Abstract—Many critical activities rely on the correct and uninterrupted operation of networked Compu...
Nowadays, cyber attacks constitute a bigger threat to organizations than before, given the higher so...
Modern computing environments involve a multitude of components working in concert to provide servic...
Policies are used extensively in managing the security of large computer infrastructure systems. Ma...
The design principle of restricting local autonomy only where necessary for global robustness has le...
AbstractWe introduce a mechanism for the verification of real-time integrity policies about the oper...
We introduce a mechanism for the verification of real-time integrity policies about the operation of...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract. Security management and maintenance are difficult in a large scale network because there a...
Today's critical infrastructures like the Power Grid are essentially physical processes controlled b...
Security Policies constitute the core of network protection infrastructures. However, their developm...
The design principle of restricting local autonomy only where necessary for global robustness has le...
Abstract: The complexity of today’s networks can only be handled by the use of more and more sophist...
Abstract—Many critical activities rely on the correct and uninterrupted operation of networked Compu...
Nowadays, cyber attacks constitute a bigger threat to organizations than before, given the higher so...