{"title":"可生存性作为IT服务的补充操作安全模型(立场文件)","authors":"A. Hecker, M. Riguidel","doi":"10.1109/SASOW.2008.49","DOIUrl":null,"url":null,"abstract":"In this paper, we argue that for big IT systems protection alone is an insufficient and a difficult-to-handle operational security model. We briefly discuss and compare alternative models and sketch a framework for a security policy based on survivability. We present our architecture for IT service security enforcement based on the survivability principle. Based on our prototype experience, we advocate profound changes in how IT services are delivered.","PeriodicalId":447279,"journal":{"name":"2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Survivability as a Complementary Operational Security Model for IT Services (position paper)\",\"authors\":\"A. Hecker, M. Riguidel\",\"doi\":\"10.1109/SASOW.2008.49\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we argue that for big IT systems protection alone is an insufficient and a difficult-to-handle operational security model. We briefly discuss and compare alternative models and sketch a framework for a security policy based on survivability. We present our architecture for IT service security enforcement based on the survivability principle. Based on our prototype experience, we advocate profound changes in how IT services are delivered.\",\"PeriodicalId\":447279,\"journal\":{\"name\":\"2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-10-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SASOW.2008.49\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SASOW.2008.49","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survivability as a Complementary Operational Security Model for IT Services (position paper)
In this paper, we argue that for big IT systems protection alone is an insufficient and a difficult-to-handle operational security model. We briefly discuss and compare alternative models and sketch a framework for a security policy based on survivability. We present our architecture for IT service security enforcement based on the survivability principle. Based on our prototype experience, we advocate profound changes in how IT services are delivered.