Abstract
Many organizations operate and manage their security systems using the ISM technology to secure their network environment effectively. However, the current ISM is passive and behaves in a post-event manner. To reduce costs and resources for managing security and to remove the possibility of an intruder succeeding in attacks, the preventive security management technology is strongly required. In this paper, we propose a PRISM model that performs preventive security management before security incidents occur. PRISM model employs security labels to deploy differentiated security measure to achieve this.
This study was partially supported by a grant of the Korea Health 21 R&D Project, Ministry of Health & Welfare, Republic of Korea. (Project no.:02-PJ3-PG6-EV08-0001)
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dorothy, E.: Denning, Information Warfare and Security. ACM Press, New York (1999)
Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 3rd edn. Pearson Education, Inc. London (2003)
Bishop, M.: Computer Security: Art and Science. Pearson Education, Inc. London (2003)
Lee, D.Y., Kim, D.S., Pang, K.H., Kim, H.S., Chung, T.M.: A Design of Scalable SNMP Agent for Managing Heterogeneous Security Systems. In: NOMS 2000, April 2000, pp. 10–15 (2000)
Secure Virtual Network Architecture: A Customer-focused White Paper, Check Point Software Technologies Ltd. (November 2000)
Open Platform for Security (OPSEC) Technical Note, Check Point Software Technology, Inc. (November 2000)
Schnackengerg, D., Djahandari, K., Sterne, D.: Infrastructure for intrusion detection and response”, DARPA Information Survivability Conference and Exposition. In: DISCEX 2000. Proceedings, vol. 2 (2000)
Schnackengerg, D., Holliday, H., Smith, R., Djahandari, K., Sterne, D.: Cooperative Intrusion Traceback and Response Architecture (CITRA). In: DARPA Information Survivability Conference & Exposition II DISCEX 2001. Proceeding, vol. 1 (2001)
Trcek, D.: Security Policy Management for Networked Information Systems. In: NOMS 2000. IEEE/IFIP, April 10-15 (2000)
Sloman, M.S.: Policy Driven Management for Distributed Systems. Journal of Network and System management, Plenum Press 2(4) (1994)
BSI, BS7799: Part1-Code of practice for information security management, British Standards Institute (1999)
CSE, MG-3: A Guide to Risk Assessment and Safeguard Selection for Information Technology Systems. Communications Security Establishment (CSE) (January 1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, D.S., Chung, T.M. (2004). A Design of Preventive Integrated Security Management System Using Security Labels and a Brief Comparison with Existing Models. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive