Abstract
We develop a computer security management model, which could dynamically adapt security policies. The proposed model consists of an adaptive security level algorithm based on MAUT and Simple Heuristics, and an adaptive security management system based on SNMP and mobile agent. The security level algorithm could adapt several security services according to the changes of network environment. And the security management system utilizes SNMP protocol and mobile agent to deal with diverse network environments. Therefore, the proposed model is expected to provide more flexible security management in the heterogeneous network environments.
This work was supported by “Research Center for Logistics Information Technology (LIT)” hosted by the Ministry of Education & Human Resources Development in Korea.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)
von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)
Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, Oxford University Press, New York (1999)
Stallings, W.: SNMP, SNMPv2, and RMON: Practical Network Management, 3rd edn. Addison-Wesley, Reading (1999)
Management Information Base for Network Management of TCP/IP-based internets: MIB-II, http://www.ietf.org/rfc/rfc1213.txt
Kim, D.S., Chung, T.M.: A Design of Preventive Integrated Security Management System Using Security Labels and A Brief Comparison with Existing Models. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 183–190. Springer, Heidelberg (2004)
Gavalas, D., et al.: Hierarchical network management: a scalable and dynamic mobile agent-based approach. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(6), 693–711 (2002)
Lee, J.-W., et al.: Analytical Models and Performance Evaluations of SNMP and Mobile Agent. Journal of Korean Institute of Communication Sciences 28(8B), 716–729 (2003)
The SSL Protocol Version 3.0, http://wp.netscape.com/eng/ssl3/draft302.txt
The TLS Protocol Version 1.0, http://www.ietf.org/rfc/rfc2246.txt
A One-Time Password System, http://www.ietf.org/rfc/rfc/2289.txt
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chae, J., Kwon, J., Chung, M. (2005). Computer Security Management Model Using MAUT and SNMP. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_16
Download citation
DOI: https://doi.org/10.1007/11424826_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)