Security in TciN M P Systems

Katalin Anna Lázár, Csilla Farkas

2007

Abstract

In [8] we proposed a modification of a grammar systems theoretic construction, called network of parallel language processors, to describe the behavior of peer-to-peer (P2P) systems. In the model the language processors form teams, send/receive information through collective and individual filters. In this paper we demonstrate how the formal language theoretic model can be employed to incorporate network security requirements. More specifically, we show how to model and detect SYN flooding attacks and enforce Discretionary Access Control.

References

  1. Dhillon, G. and J. Backhouse, Information System Security Management in the New Millennium. Communications of the ACM, 2000. 43(7): p. 125-128.
  2. CSI, Computer Security Institute. 2002: Computer Crime and Security Survey.
  3. Wood, C.C. Researchers Must Disclose All Sponsors And Potential Conflicts. in Computer Security Alert. 2000. San Francisco, CA: Computer Security Institute.
  4. Biever, C., Revealed: the true cost of computer crime. Computer Crime Research Center, 2005.
  5. Goldfarb, A., The medium-term effects of unavailability Journal Quantitative Marketing and Economics 2006. 4(2): p. 143-171
  6. Telang, R. and S. Wattal. Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis. in 4h Workshop on Economics and Information Security. 2005. Boston.
  7. Sant-Germain, R., Information Security Management Best Practice Based on ISO/IEC 17799. Setting Standars, The information Management JournaL, 2005. 39(4): p. 60-62, 64- 66.
  8. Areiza, K.A., A.M. Barrientos, R. Rincón, and J.G. Lalinde-Pulido. Hacia un modelo de madurez para la seguridad de la información. in IV Congreso Internacional de Auditoría y Seguridad de la Información. 2005.
  9. COBIT, Cobit Guidelines, Information Security Audit and Control Association. 2000.
  10. Aceituno, V., Ism3 1.0: Information security management matury model. 2005.
  11. Barrientos, A.M. and K.A. Areiza, Integración de un sistema de gestión de seguridad de la información conun sistema de gestión de calidad., in Master's thesis. 2005, Universidad EAFIT.
  12. Eloff, J. and M. Eloff. Information Security Management - A New Paradigm. in Annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology SAICSIT03. 2003.
  13. Lee, J., J. Lee, S. Lee, and B. Choi. A CC-based Security Engineering Process Evaluation Model. in Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC). 2003.
  14. Areiza, K.A., A.M. Barrientos, R. Rincón, and J.G. Lalinde-Pulido. Hacia un modelo de madurez para la seguridad de la información. in 3er Congreso Iberoamericano de seguridad Informática. 2005.
  15. Walton, J.P. Developing an Enterprise Information Security Policy. in 30th annual ACM SIGUCCS conference on User services. 2002.
  16. Lund, M.S., F.d. Braber, and K. Stolen, Proceedings of the Seventh European Conference On Software Maintenance And Reengineering (CSMR'03). IEEE, 2003.
  17. MageritV2, Metodología de Análisis y Gestión de Riesgos para las Tecnologías de la Información, V2. 2005.
  18. Siegel, C.A., T.R. Sagalow, and P. Serritella, Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security. Security Management Practices, 2002. sept/oct: p. 33-49.
  19. Garigue, R. and M. Stefaniu, Information Security Governance Reporting. Information Systems Security, 2003. sept/oct: p. 36-40.
  20. Von Solms, B. and R. Von Solms, Incremental Information Security Certification. Computers & Security, 2001. 20: p. 308-310.
  21. Stephenson, P., Forensic Análisis of Risks in Enterprise Systems. Law, Investigation and Ethics, 2004. sep/oct: p. 20-21.
Download


Paper Citation


in Harvard Style

Anna Lázár K. and Farkas C. (2007). Security in TciN M P Systems . In Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007) ISBN 978-972-8865-96-2, pages 95-104. DOI: 10.5220/0002425300950104


in Bibtex Style

@conference{wosis07,
author={Katalin Anna Lázár and Csilla Farkas},
title={Security in TciN M P Systems},
booktitle={Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007)},
year={2007},
pages={95-104},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002425300950104},
isbn={978-972-8865-96-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2007)
TI - Security in TciN M P Systems
SN - 978-972-8865-96-2
AU - Anna Lázár K.
AU - Farkas C.
PY - 2007
SP - 95
EP - 104
DO - 10.5220/0002425300950104