[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Computer Security Management Model Using MAUT and SNMP

  • Conference paper
Computational Science and Its Applications – ICCSA 2005 (ICCSA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3481))

Included in the following conference series:

  • 1716 Accesses

Abstract

We develop a computer security management model, which could dynamically adapt security policies. The proposed model consists of an adaptive security level algorithm based on MAUT and Simple Heuristics, and an adaptive security management system based on SNMP and mobile agent. The security level algorithm could adapt several security services according to the changes of network environment. And the security management system utilizes SNMP protocol and mobile agent to deal with diverse network environments. Therefore, the proposed model is expected to provide more flexible security management in the heterogeneous network environments.

This work was supported by “Research Center for Logistics Information Technology (LIT)” hosted by the Ministry of Education & Human Resources Development in Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Tradeoffs. John Wiley & Sons, New York (1976)

    Google Scholar 

  2. von Winterfeld, D., Edwards, W.: Decision Analysis and Behavioral Research. Cambridge University Press, Cambridge (1986)

    Google Scholar 

  3. Martignon, L., Hoffrage, U.: Why Does One-Reason Decision Making Work? In: Simple Heuristics That Make Us Smart, Oxford University Press, New York (1999)

    Google Scholar 

  4. Stallings, W.: SNMP, SNMPv2, and RMON: Practical Network Management, 3rd edn. Addison-Wesley, Reading (1999)

    Google Scholar 

  5. Management Information Base for Network Management of TCP/IP-based internets: MIB-II, http://www.ietf.org/rfc/rfc1213.txt

  6. Kim, D.S., Chung, T.M.: A Design of Preventive Integrated Security Management System Using Security Labels and A Brief Comparison with Existing Models. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 183–190. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Gavalas, D., et al.: Hierarchical network management: a scalable and dynamic mobile agent-based approach. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(6), 693–711 (2002)

    Google Scholar 

  8. Lee, J.-W., et al.: Analytical Models and Performance Evaluations of SNMP and Mobile Agent. Journal of Korean Institute of Communication Sciences 28(8B), 716–729 (2003)

    Google Scholar 

  9. The SSL Protocol Version 3.0, http://wp.netscape.com/eng/ssl3/draft302.txt

  10. The TLS Protocol Version 1.0, http://www.ietf.org/rfc/rfc2246.txt

  11. A One-Time Password System, http://www.ietf.org/rfc/rfc/2289.txt

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chae, J., Kwon, J., Chung, M. (2005). Computer Security Management Model Using MAUT and SNMP. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_16

Download citation

  • DOI: https://doi.org/10.1007/11424826_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25861-2

  • Online ISBN: 978-3-540-32044-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics