Academic literature on the topic 'Security orchestration and automation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security orchestration and automation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security orchestration and automation"
Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.
Full textKinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.
Full textChara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.
Full textLee, Minkyung, Julian Jang-Jaccard, and Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment." Computers, Materials & Continua 73, no. 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.
Full textChen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.
Full textOhmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.
Full textSierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.
Full textSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Full textGoutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.
Full textPotter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Full textDissertations / Theses on the topic "Security orchestration and automation"
Fernandes, Pereira Sonia, and Nejat Hamid. "Closed-Loop Orchestration Solution." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253005.
Full textDatornätverk utvecklas kontinuerligt och växer i storlek och komplexitet. Nyteknik införs som ytterligare ökar komplexiteten. Nätverksservice orkestrering handlar om att skicka ut konfiguration automatiskt till enheter i nätverket utan mänsklig in- blandning. Det kan finnas problem som gör att orkestreringen misslyckas. I många fall måste manuella åtgärder utföras för att lösa problemet, vilket är mycket motsä- gelsefullt, eftersom målet med orkestrering är att det ska vara fullt automatiserat. Det finns indikationer på att fel kan detekteras och hanteras av en återkopplings- mekanismen. Detta examensarbete syftar till att bygga på aktuell insikt, och om möj- ligt, verifiera att återkopplingsmekanismen är en möjlig metod. Efter överväganden på vilka olika sätt som projektmålet kunde uppnås föll valet på att skapa en testmiljö där ansatsen kunde testas. Testmiljön användes för att utreda om ett nätverksorkestreringssystem kan integreras med en återkopplings mekanism. Resultat av projektet presenterar ett sätt att automatiskt upptäcka ett nätverksfel och skicka återkoppling till ett nätverksorkestreringssystem. Nätverksorkestreraren kan sedan detektera och åtgärda felet.
Abdelmassih, Christian. "Container Orchestration in Security Demanding Environments at the Swedish Police Authority." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-228531.
Full textPopulariteten av containers och container-orkestrering inom molntjänster motiveras av många aspekter, från tekniska och organisatoriska till ekonomiska vinster. I detta klimat är även säkerhetskrävande organisationer intresserade av sådana teknologier men söker försäkran att deras kravbild går att möta. Syftet med denna avhandling var att utreda hur separation mellan applikationer kan nås vid användning av Docker och Kubernetes så att Polismyndighetens krav kan uppfyllas. Undersökningen omfattade en litterär studie av vetenskapliga publikationer och officiell dokumentation samt en teknisk studie med iterativt skapande av Kubernetes kluster med diverse variationer. En modell definierades för att representera kravbilden för ideal separation. Vidare så introducerades även ett system för klassificering av separationskrav hos applikationer. Resultatet omfattar tre förslag på arkitekturer för att uppnå segmentering av klusternätverk i Kubernetes, två föreslagna systemkomponenter för att uppfylla segmenteringen, och en strategi för att erbjuda värd-baserad separation mellan containers. Varje förslag evaluerades med hänsyn till lämplighet och risker för myndigheten och parter med liknande kravbild. Avhandlingens slutsats är att en mångsidig applikationsisolering kan uppnås i Docker och Kubernetes. Därmed kan teknologierna uppnå en lämplig grad av separation för att kunna användas för säkerhetskrävande miljöer.
Compastié, Maxime. "Software-defined Security for Distributed Clouds." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0307/document.
Full textIn this thesis, we propose an approach for software-defined security in distributed clouds. More specifically, we show to what extent this programmability can contribute to the protection of distributed cloud services, through the generation of secured unikernel images. These ones are instantiated in the form of lightweight virtual machines, whose attack surface is limited and whose security is driven by a security orchestrator. The contributions of this thesis are threefold. First, we present a logical architecture supporting the programmability of security mechanims in a multi-cloud and multi-tenant context. It permits to align and parameterize these mechanisms for cloud services whose resources are spread over several providers and tenants. Second, we introduce a method for generating secured unikernel images in an on-the-fly manner. This one permits to lead to specific and constrained resources, that integrate security mechanisms as soon as the image generation phase. These ones may be built in a reactive or proactive manner, in order to address elasticity requirements. Third, we propose to extend the TOSCA orchestration language, so that is is possible to generate automatically secured resources, according to different security levels in phase with the orchestration. Finally, we detail a prototyping and extensive series of experiments that are used to evaluate the benefits and limits of the proposed approach
Nejman, Dawid. "Automation of data processing in the network of geospatial web services." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4029.
Full textContact details: email: dawidnejman@gmail.com phone: +48 511-139-190
Pattaranantakul, Montida. "Moving towards software-defined security in the era of NFV and SDN." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL009/document.
Full textThis thesis is intended to explore security issues in the virtualized and software-defined world, and starts with two important hypotheses: (1) SDN and NFV offer plenty of opportunities for us to rethink security management in the new networking paradigms; (2) both legacy and new security threats and vulnerabilities in NFV/SDN enabled environments need to be sufficiently addressed in order to pave the way for their further development and deployment. To validate the hypotheses, we carry out an in-depth study on NFV/SDN from security perspective, including its architecture, management and orchestration (MANO) framework, and use cases, leading to two major contributions, (1) a security management and orchestration framework (called SecMANO) based on NFV MANO, which has the potential to manage a set of policy-driven security mechanisms, such as access control, IDS/IPS, network isolation, data protection; (2) a comprehensive threat analysis on five NFV use cases and the state-of-the-art security countermeasures, resulting in a NFV layer-specific threat taxonomy and a set of security recommendations on securing NFV based services.We believe that both of the two contributions lay down a foundation for security research in NFV/SDN domain. In particular, based on the two contributions, we further develop a security orchestrator as an extension of available NFV orchestrator, with an objective to enabling the basic security functions to be effectively orchestrated and provided as on-demand services to the customers, meanwhile allowing high-level security policies to be specified and enforced in a dynamic and flexible way. Specifically, a software-defined access control paradigm is implemented and prototyped with OpenStack and Tacker (a NFV orchestrator using TOSCA model), which allows the security administrators to dynamically customize the access control models and policies for different tenant domains, eventually achieving flexible and scalable protection across different layers and multiple cloud data centers. Both prototype of concept and real-life experiments on testbed have been carried out, clearly demonstrating the feasibility and effectiveness of our security orchestrator.In addition, as our NFV cross-layer threat taxonomy indicates, a large set of novel threats will be introduced, among which VNF (Virtualized Network Function) is a unique and important asset that deserves careful protection. The fourth contribution of this thesis is therefore devoted to achieving secure and dependable SFC (Service Function Chaining) in NFV and SDN environment. Specifically, an identity-based ordered multisignature scheme called SecSFC is designed and applied to ensure that, (1) each service function involved in a particular service chain is authenticated and legitimate; (2) all the service functions are chained in a consistent, optimal, and reliable way, meeting with the pre-defined high-level specifications like VNF Forwarding Graph. Both theoretical security analysis and experimental results demonstrate that our scheme can effectively defend against a large set of destructive attacks like rule modification and topology tempering, moving an important step towards secure and dependable SFC. Importantly, the signature construction and validation process is lightweight, generating compact and constant-size keys and signatures, thereby only incurring minimal computational overhead and latency
Thakur, Ritika. "Access control model to support orchestration of CRUD expressions." Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18452.
Full textAccess Control is a sensitive and crucial aspect when it comes to securing the data present in the databases. In an application which is driven by Create, Read, Update and Delete (CRUD) expressions, users can execute a single CRUD expression or a sequence of CRUD expressions to achieve the desired results. In such type of applications, the Access Control is not just Iimited to authorizing the subject for accessing the object, but it also aims to authorize and validate the operations that a subject can perform on the data after the authorization. Current Access Control models are generally concerned with restricting the access to the resources. However, once the subject is authorized, there are no restrictions on the actions a subject can perform on the resources. In this work an Access Control Model has been presented which extends current Access Control model's features to provide an environment where a set of predefined policies are implemented as graphs of CRUD expressions. The design of the access control policies is based on the CRUD expressions that a user needs to execute to complete a task. These graphs of CRUD expressions are hence used for controlling and validating the actions that can be performed on authorized information. In order to reuse the policies, presented model allows the inter execution of the policies based on some predefined rules. The aim of the present thesis work is to provide a structure which allows the application users to only execute the authorized sequences of CRUD expressions in a predefined order and allows the security experts to design the policies in a flexible way through the graph data structure. As a proof of concept, Role based Access Control model (RBAC) has been taken as a reference access control model and the base for this work is chosen as Secured, Distributed and Dynamic RBAC (S-DRACA) which allowed the sequence of CRUD expressions to be executed in single direction.
O controlo de acesso é um aspecto sensível e crucial quando se fala de proteger dados presentes em base de dados. Em aplicações que assentam numa base de dados baseadas em expressões Creafe, Read, Update e Delefe (CRUD) , os utilizadores podem executar uma ou uma sequência de expressões CRUD para obter um dado resultado. Neste tipo de aplicações o controlo de acesso não é limitado apenas a autorizar o acesso a um objecto por um sujeito, mas também a autorizar e validar as operações que o sujeito pode fazer sobre os dados depois de obter autorização. Os modelos atuais de controlo de acesso geralmente focamse em restringir o acesso aos recursos CRUD a CRUD. No entanto, logo que o sujeito é autorizado, não há restrições sob as ações que este pode efetuar sobre esses recursos. Neste trabalho é apresentado um modelo de controlo de acesso que extende as funcionalidades dos modelos de controlo de acesso atuais para fornecer um ambiente onde um conjunto de politicas predefinidas são implementadas como grafos de expressões CRUD. Estes grafos de expressões CRUD são considerados como sequências que atuam como politicas guardadas e preconfiguradas. O design das sequências é baseado nas operações que o utilizador deseja efetuar para obter um dado resultado. Estas sequências de expressões CRUD são assim usadas para controlar e validar as ações que podem ser efetuadas sobre a informação armazenada. De forma a reusar estas políticas, o modelo apresentado define o uso de execuçao externa de políticas configuradas. O objetivo do trabalho nesta tese é fornecer uma estrutura que permite aos utilizadores de aplicações apenas executarem sequências autorizadas de expressões CRUD numa ordem predefinida e permitir aos administradores de sistema de desenharem politicas de uma forma flexível através de estruturas de grafos. Como prova de conceito, o modelo Role Based Access Control (RBAC) foi tido como referência para o modelo de controlo de acesso e para a base deste trabalho foi escolhido o S-DRACA que permite sequências de expressões CRUD de serem executadas por ordem.
Chollet, Stéphanie. "Orchestration de services hétérogènes et sécurisés." Grenoble 1, 2009. http://www.theses.fr/2009GRE10283.
Full textService-oriented Computing (SOC) has appeared recently as a new software engineering paradigm. The very purpose of this reuse-based approach is to build applications through the late composition of independent software elements, called services, which are made available at run-time by internal or external providers. SOC brings properties of major interest. First, it supports rapid application development. Using existing, already tested, services is likely to reduce the time needed to build up an application and the overall quality of this application. SOC also improves software flexibility through late binding. A service to be used by an application is chosen at the last moment, based on its actual availability and on its properties at that moment. The service orientation has also to face thorny problems, as in any reuse-based approach. In this work, we focus on two major issues: the integration of heterogeneous service-oriented technologies and the management of security aspects when invoking a service. Security is actually a major concern to SOC practitioners. SOC technologies have allowed companies to expose applications, internally and externally, and, for that reason are heavily used. However, in some distributed environments, software services and process engines can be alarmingly vulnerable. Service-based processes can expose organizations to a considerable amount of security risk and dependability degradation. We propose to use a model-driven approach for solving this problem. During system design, paradigms such as abstraction, separation of concerns and language definition are used to define a model of the service composition with security properties. This model is transformed into an execution model. We present a generative environment applying these principles for service composition. This environment has been built as part of the SODA European project and validated on several industrial use cases
Zerkane, Salaheddine. "Security Analysis and Access Control Enforcement through Software Defined Networks." Thesis, Brest, 2018. http://www.theses.fr/2018BRES0057/document.
Full textSoftware Defined Networking (SDN) is an emerging paradigm that promises to resolve the limitations of the conventional network architecture.SDN and cyber security have a reciprocal relationship. In this thesis, we study and explore two aspects of this relationship. On the one hand, we study security for SDN by performing a vulnerability analysis of SDN. Such security analysis is a crucial process in identifying SDN security flaws and in measuring their impacts. It is necessary for improving SDN security and for understanding its weaknesses.On the other hand, we explore SDN for security. Such an aspect of the relationship between SDN and security focusses on the advantages that SDN brings into security.The thesis designs and implements an SDN stateful firewall that transforms the Finite State Machine of network protocols to an SDN Equivalent State Machine. Besides, the thesis evaluates SDN stateful firewall and NetFilter regarding their performance and their resistance to Syn Flooding attacks.Furthermore, the thesis uses SDN orchestration for policy enforcement. It proposes a firewall policy framework to express, assess, negotiate and deploy firewall policies in the context of SDN as a Service in the cloud
Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.
Full textPeacock, Matthew. "Anomaly Detection in BACnet/IP managed Building Automation Systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2019. https://ro.ecu.edu.au/theses/2178.
Full textBooks on the topic "Security orchestration and automation"
Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.
Full textBryan, Singer, ed. Industrial automation and process control security. Boca Raton: CRC Press, 2012.
Find full textKrutz, Ronald L. Industrial automation and control system security principles. Research Triangle Park, NC: International Society of Automation (ISA), 2013.
Find full textSoper, Mark Edward. Absolute beginner's guide to home automation. Indianapolis, Ind: Que, 2005.
Find full textUnited States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Find full textGirardin, Pierre. La domotique. Sainte-Foy, Québec: Société d'habitation du Québec, 1994.
Find full textHuman behavior recognition technologies: Intelligent applications for monitoring and security. Hershey, PA: Information Science Reference, 2013.
Find full textBook chapters on the topic "Security orchestration and automation"
Christian, Juan, Luis Paulino, and Alan Oliveira de Sá. "A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response." In Information Security Practice and Experience, 115–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21280-2_7.
Full textLing, Xiaobo, Longyun Qi, Man Li, and Jun Yan. "Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 195–206. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99191-3_15.
Full textMir, Abdul Wahid, and Ramkumar Ketti Ramachandran. "Implementation of Security Orchestration, Automation and Response (SOAR) in Smart Grid-Based SCADA Systems." In Sixth International Conference on Intelligent Computing and Applications, 157–69. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1335-7_14.
Full textKomarek, Ales, Jakub Pavlik, and Vladimir Sobeslav. "Orchestration and Automation of NVF." In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 664–72. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69835-9_62.
Full textChevalier, Yannick, Mohamed Anis Mekki, and Michaël Rusinowitch. "Orchestration under Security Constraints." In Formal Methods for Components and Objects, 23–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25271-6_2.
Full textSabharwal, Navin, and Piyush Pandey. "Automation and Orchestration of Container Monitoring." In Monitoring Microservices and Containerized Applications, 271–302. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6216-0_9.
Full textCaelli, W. "Office Automation Security." In Information Security for Managers, 258–82. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10137-5_6.
Full textOxer, Jonathan, and Hugh Blemings. "Security/Automation Sensors." In Practical Arduino, 81–100. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2478-5_6.
Full textApaza-Condori, Jeferson, and Eveling Castro-Gutierrez. "A Heterogeneous Scalable-Orchestration Architecture for Home Automation." In Advances in Intelligent Systems and Computing, 218–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39445-5_17.
Full textKrupaviciute, Asta, and Jocelyne Fayn. "Expert Activities Automation through Enhanced Business Services Orchestration." In Software Architecture, 497–500. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15114-9_49.
Full textConference papers on the topic "Security orchestration and automation"
Zheng, Yifeng, Arindam Pal, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, and Helge Janicke. "Towards IoT Security Automation and Orchestration." In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2020. http://dx.doi.org/10.1109/tps-isa50397.2020.00018.
Full textVast, Rahul, Shruti Sawant, Aishwarya Thorbole, and Vishal Badgujar. "Artificial Intelligence based Security Orchestration, Automation and Response System." In 2021 6th International Conference for Convergence in Technology (I2CT). IEEE, 2021. http://dx.doi.org/10.1109/i2ct51068.2021.9418109.
Full textSajid, Md Sajidul Islam, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md Mazharul Islam, Walter Diong, and Latifur Khan. "SODA: A System for Cyber Deception Orchestration and Automation." In ACSAC '21: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485832.3485918.
Full textBartwal, Upendra, Subhasis Mukhopadhyay, Rohit Negi, and Sandeep Shukla. "Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots." In 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2022. http://dx.doi.org/10.1109/dsc54232.2022.9888808.
Full textWang, Di, Ruxia Yang, and Xianzhou Gao. "Data security compliance management and control technology based on scene orchestration." In 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2021. http://dx.doi.org/10.1109/icmtma52658.2021.00093.
Full textKalliola, Aapo, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, and Tuomas Aura. "Security Wrapper Orchestration in Cloud." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3232853.
Full textBaouab, Aymen, Olivier Perrin, Nicolas Biri, and Claude Godart. "Security meta-services orchestration architecture." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394146.
Full textSong Luo and Malek Ben Salem. "Orchestration of software-defined security services." In 2016 ICC - 2016 IEEE International Conference on Communications Workshops (ICC). IEEE, 2016. http://dx.doi.org/10.1109/iccw.2016.7503826.
Full textWendland, Florian, and Christian Banse. "Enhancing NFV Orchestration with Security Policies." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233253.
Full textPotluri, Ravi, and Kristen Young. "Analytics Automation for Service Orchestration." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297249.
Full textReports on the topic "Security orchestration and automation"
Dempsey, Kelley, Nedim Goren, Paul Eavy, and George Moore. Automation support for security control assessments:. Gaithersburg, MD: National Institute of Standards and Technology, December 2018. http://dx.doi.org/10.6028/nist.ir.8011-3.
Full textDempsey, Kelley, Eduardo Takamura, Paul Eavy, and George Moore. Automation support for security control assessments:. Gaithersburg, MD: National Institute of Standards and Technology, April 2020. http://dx.doi.org/10.6028/nist.ir.8011-4.
Full textCam-Winget, N., and L. Lorenzin. Security Automation and Continuous Monitoring (SACM) Requirements. RFC Editor, September 2017. http://dx.doi.org/10.17487/rfc8248.
Full textBooth, Harold, and Adam Halbardier. Trust model for security automation data 1.0 (TMSAD). Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7802.
Full textDempsey, Kelley, Paul Eavy, and George Moore. Automation support for security control assessments. volume 1: overview. Gaithersburg, MD: National Institute of Standards and Technology, June 2017. http://dx.doi.org/10.6028/nist.ir.8011-1.
Full textQuinn, S. D., D. A. Waltermire, C. S. Johnson, K. A. Scarfone, and J. F. Banghart. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-126.
Full textWaltermire, D. A., S. D. Quinn, and K. A. Scarfone. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r1.
Full textWaltermire, D. A., S. D. Quinn, K. A. Scarfone, and A. M. Halbardier. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r2.
Full textWaltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. Gaithersburg, MD: National Institute of Standards and Technology, September 2018. http://dx.doi.org/10.6028/nist.cswp.09102018.
Full textWaltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. Gaithersburg, MD: National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.cswp.7.
Full text