Добірка наукової літератури з теми "Security orchestration and automation"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Security orchestration and automation".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Security orchestration and automation"
Tembhurne, Omprakash, Sonali Milmile, Ganesh R. Pathak, Atul O. Thakare, and Abhijeet Thakare. "An Orchestrator." International Journal of Open Source Software and Processes 13, no. 1 (January 1, 2022): 1–17. http://dx.doi.org/10.4018/ijossp.308792.
Повний текст джерелаKinyua, Johnson, and Lawrence Awuah. "AI/ML in Security Orchestration, Automation and Response: Future Research Directions." Intelligent Automation & Soft Computing 28, no. 2 (2021): 527–45. http://dx.doi.org/10.32604/iasc.2021.016240.
Повний текст джерелаChara Eddine, Meftah Mohammed. "A Comparative Study of Formal Approaches for Web Service Oriented Architecture." Network and Communication Technologies 5, no. 2 (December 31, 2020): 15. http://dx.doi.org/10.5539/nct.v5n2p15.
Повний текст джерелаLee, Minkyung, Julian Jang-Jaccard та Jin Kwak. "Novel Architecture of Security Orchestration, Automation and Response in營nternet of Blended Environment". Computers, Materials & Continua 73, № 1 (2022): 199–223. http://dx.doi.org/10.32604/cmc.2022.028495.
Повний текст джерелаChen, Shichao, and Mengchu Zhou. "Evolving Container to Unikernel for Edge Computing and Applications in Process Industry." Processes 9, no. 2 (February 14, 2021): 351. http://dx.doi.org/10.3390/pr9020351.
Повний текст джерелаOhmori, Motoyuki. "On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System." Journal of Information Processing 27 (2019): 564–73. http://dx.doi.org/10.2197/ipsjjip.27.564.
Повний текст джерелаSierra, Rodrigo, and Hubert Odziemczyk. "Readying CERN for connected device era." EPJ Web of Conferences 245 (2020): 07015. http://dx.doi.org/10.1051/epjconf/202024507015.
Повний текст джерелаSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain, and Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review." Sustainability 14, no. 18 (September 7, 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Повний текст джерелаGoutam, Aradhana, Raj Kamal, and Maya Ingle. "Specification for security Orchestration." Procedia Engineering 38 (2012): 429–41. http://dx.doi.org/10.1016/j.proeng.2012.06.053.
Повний текст джерелаPotter, Bruce. "Security automation." Network Security 2007, no. 9 (September 2007): 18–19. http://dx.doi.org/10.1016/s1353-4858(07)70084-3.
Повний текст джерелаДисертації з теми "Security orchestration and automation"
Fernandes, Pereira Sonia, and Nejat Hamid. "Closed-Loop Orchestration Solution." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253005.
Повний текст джерелаDatornätverk utvecklas kontinuerligt och växer i storlek och komplexitet. Nyteknik införs som ytterligare ökar komplexiteten. Nätverksservice orkestrering handlar om att skicka ut konfiguration automatiskt till enheter i nätverket utan mänsklig in- blandning. Det kan finnas problem som gör att orkestreringen misslyckas. I många fall måste manuella åtgärder utföras för att lösa problemet, vilket är mycket motsä- gelsefullt, eftersom målet med orkestrering är att det ska vara fullt automatiserat. Det finns indikationer på att fel kan detekteras och hanteras av en återkopplings- mekanismen. Detta examensarbete syftar till att bygga på aktuell insikt, och om möj- ligt, verifiera att återkopplingsmekanismen är en möjlig metod. Efter överväganden på vilka olika sätt som projektmålet kunde uppnås föll valet på att skapa en testmiljö där ansatsen kunde testas. Testmiljön användes för att utreda om ett nätverksorkestreringssystem kan integreras med en återkopplings mekanism. Resultat av projektet presenterar ett sätt att automatiskt upptäcka ett nätverksfel och skicka återkoppling till ett nätverksorkestreringssystem. Nätverksorkestreraren kan sedan detektera och åtgärda felet.
Abdelmassih, Christian. "Container Orchestration in Security Demanding Environments at the Swedish Police Authority." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-228531.
Повний текст джерелаPopulariteten av containers och container-orkestrering inom molntjänster motiveras av många aspekter, från tekniska och organisatoriska till ekonomiska vinster. I detta klimat är även säkerhetskrävande organisationer intresserade av sådana teknologier men söker försäkran att deras kravbild går att möta. Syftet med denna avhandling var att utreda hur separation mellan applikationer kan nås vid användning av Docker och Kubernetes så att Polismyndighetens krav kan uppfyllas. Undersökningen omfattade en litterär studie av vetenskapliga publikationer och officiell dokumentation samt en teknisk studie med iterativt skapande av Kubernetes kluster med diverse variationer. En modell definierades för att representera kravbilden för ideal separation. Vidare så introducerades även ett system för klassificering av separationskrav hos applikationer. Resultatet omfattar tre förslag på arkitekturer för att uppnå segmentering av klusternätverk i Kubernetes, två föreslagna systemkomponenter för att uppfylla segmenteringen, och en strategi för att erbjuda värd-baserad separation mellan containers. Varje förslag evaluerades med hänsyn till lämplighet och risker för myndigheten och parter med liknande kravbild. Avhandlingens slutsats är att en mångsidig applikationsisolering kan uppnås i Docker och Kubernetes. Därmed kan teknologierna uppnå en lämplig grad av separation för att kunna användas för säkerhetskrävande miljöer.
Compastié, Maxime. "Software-defined Security for Distributed Clouds." Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0307/document.
Повний текст джерелаIn this thesis, we propose an approach for software-defined security in distributed clouds. More specifically, we show to what extent this programmability can contribute to the protection of distributed cloud services, through the generation of secured unikernel images. These ones are instantiated in the form of lightweight virtual machines, whose attack surface is limited and whose security is driven by a security orchestrator. The contributions of this thesis are threefold. First, we present a logical architecture supporting the programmability of security mechanims in a multi-cloud and multi-tenant context. It permits to align and parameterize these mechanisms for cloud services whose resources are spread over several providers and tenants. Second, we introduce a method for generating secured unikernel images in an on-the-fly manner. This one permits to lead to specific and constrained resources, that integrate security mechanisms as soon as the image generation phase. These ones may be built in a reactive or proactive manner, in order to address elasticity requirements. Third, we propose to extend the TOSCA orchestration language, so that is is possible to generate automatically secured resources, according to different security levels in phase with the orchestration. Finally, we detail a prototyping and extensive series of experiments that are used to evaluate the benefits and limits of the proposed approach
Nejman, Dawid. "Automation of data processing in the network of geospatial web services." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4029.
Повний текст джерелаContact details: email: dawidnejman@gmail.com phone: +48 511-139-190
Pattaranantakul, Montida. "Moving towards software-defined security in the era of NFV and SDN." Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLL009/document.
Повний текст джерелаThis thesis is intended to explore security issues in the virtualized and software-defined world, and starts with two important hypotheses: (1) SDN and NFV offer plenty of opportunities for us to rethink security management in the new networking paradigms; (2) both legacy and new security threats and vulnerabilities in NFV/SDN enabled environments need to be sufficiently addressed in order to pave the way for their further development and deployment. To validate the hypotheses, we carry out an in-depth study on NFV/SDN from security perspective, including its architecture, management and orchestration (MANO) framework, and use cases, leading to two major contributions, (1) a security management and orchestration framework (called SecMANO) based on NFV MANO, which has the potential to manage a set of policy-driven security mechanisms, such as access control, IDS/IPS, network isolation, data protection; (2) a comprehensive threat analysis on five NFV use cases and the state-of-the-art security countermeasures, resulting in a NFV layer-specific threat taxonomy and a set of security recommendations on securing NFV based services.We believe that both of the two contributions lay down a foundation for security research in NFV/SDN domain. In particular, based on the two contributions, we further develop a security orchestrator as an extension of available NFV orchestrator, with an objective to enabling the basic security functions to be effectively orchestrated and provided as on-demand services to the customers, meanwhile allowing high-level security policies to be specified and enforced in a dynamic and flexible way. Specifically, a software-defined access control paradigm is implemented and prototyped with OpenStack and Tacker (a NFV orchestrator using TOSCA model), which allows the security administrators to dynamically customize the access control models and policies for different tenant domains, eventually achieving flexible and scalable protection across different layers and multiple cloud data centers. Both prototype of concept and real-life experiments on testbed have been carried out, clearly demonstrating the feasibility and effectiveness of our security orchestrator.In addition, as our NFV cross-layer threat taxonomy indicates, a large set of novel threats will be introduced, among which VNF (Virtualized Network Function) is a unique and important asset that deserves careful protection. The fourth contribution of this thesis is therefore devoted to achieving secure and dependable SFC (Service Function Chaining) in NFV and SDN environment. Specifically, an identity-based ordered multisignature scheme called SecSFC is designed and applied to ensure that, (1) each service function involved in a particular service chain is authenticated and legitimate; (2) all the service functions are chained in a consistent, optimal, and reliable way, meeting with the pre-defined high-level specifications like VNF Forwarding Graph. Both theoretical security analysis and experimental results demonstrate that our scheme can effectively defend against a large set of destructive attacks like rule modification and topology tempering, moving an important step towards secure and dependable SFC. Importantly, the signature construction and validation process is lightweight, generating compact and constant-size keys and signatures, thereby only incurring minimal computational overhead and latency
Thakur, Ritika. "Access control model to support orchestration of CRUD expressions." Master's thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/18452.
Повний текст джерелаAccess Control is a sensitive and crucial aspect when it comes to securing the data present in the databases. In an application which is driven by Create, Read, Update and Delete (CRUD) expressions, users can execute a single CRUD expression or a sequence of CRUD expressions to achieve the desired results. In such type of applications, the Access Control is not just Iimited to authorizing the subject for accessing the object, but it also aims to authorize and validate the operations that a subject can perform on the data after the authorization. Current Access Control models are generally concerned with restricting the access to the resources. However, once the subject is authorized, there are no restrictions on the actions a subject can perform on the resources. In this work an Access Control Model has been presented which extends current Access Control model's features to provide an environment where a set of predefined policies are implemented as graphs of CRUD expressions. The design of the access control policies is based on the CRUD expressions that a user needs to execute to complete a task. These graphs of CRUD expressions are hence used for controlling and validating the actions that can be performed on authorized information. In order to reuse the policies, presented model allows the inter execution of the policies based on some predefined rules. The aim of the present thesis work is to provide a structure which allows the application users to only execute the authorized sequences of CRUD expressions in a predefined order and allows the security experts to design the policies in a flexible way through the graph data structure. As a proof of concept, Role based Access Control model (RBAC) has been taken as a reference access control model and the base for this work is chosen as Secured, Distributed and Dynamic RBAC (S-DRACA) which allowed the sequence of CRUD expressions to be executed in single direction.
O controlo de acesso é um aspecto sensível e crucial quando se fala de proteger dados presentes em base de dados. Em aplicações que assentam numa base de dados baseadas em expressões Creafe, Read, Update e Delefe (CRUD) , os utilizadores podem executar uma ou uma sequência de expressões CRUD para obter um dado resultado. Neste tipo de aplicações o controlo de acesso não é limitado apenas a autorizar o acesso a um objecto por um sujeito, mas também a autorizar e validar as operações que o sujeito pode fazer sobre os dados depois de obter autorização. Os modelos atuais de controlo de acesso geralmente focamse em restringir o acesso aos recursos CRUD a CRUD. No entanto, logo que o sujeito é autorizado, não há restrições sob as ações que este pode efetuar sobre esses recursos. Neste trabalho é apresentado um modelo de controlo de acesso que extende as funcionalidades dos modelos de controlo de acesso atuais para fornecer um ambiente onde um conjunto de politicas predefinidas são implementadas como grafos de expressões CRUD. Estes grafos de expressões CRUD são considerados como sequências que atuam como politicas guardadas e preconfiguradas. O design das sequências é baseado nas operações que o utilizador deseja efetuar para obter um dado resultado. Estas sequências de expressões CRUD são assim usadas para controlar e validar as ações que podem ser efetuadas sobre a informação armazenada. De forma a reusar estas políticas, o modelo apresentado define o uso de execuçao externa de políticas configuradas. O objetivo do trabalho nesta tese é fornecer uma estrutura que permite aos utilizadores de aplicações apenas executarem sequências autorizadas de expressões CRUD numa ordem predefinida e permitir aos administradores de sistema de desenharem politicas de uma forma flexível através de estruturas de grafos. Como prova de conceito, o modelo Role Based Access Control (RBAC) foi tido como referência para o modelo de controlo de acesso e para a base deste trabalho foi escolhido o S-DRACA que permite sequências de expressões CRUD de serem executadas por ordem.
Chollet, Stéphanie. "Orchestration de services hétérogènes et sécurisés." Grenoble 1, 2009. http://www.theses.fr/2009GRE10283.
Повний текст джерелаService-oriented Computing (SOC) has appeared recently as a new software engineering paradigm. The very purpose of this reuse-based approach is to build applications through the late composition of independent software elements, called services, which are made available at run-time by internal or external providers. SOC brings properties of major interest. First, it supports rapid application development. Using existing, already tested, services is likely to reduce the time needed to build up an application and the overall quality of this application. SOC also improves software flexibility through late binding. A service to be used by an application is chosen at the last moment, based on its actual availability and on its properties at that moment. The service orientation has also to face thorny problems, as in any reuse-based approach. In this work, we focus on two major issues: the integration of heterogeneous service-oriented technologies and the management of security aspects when invoking a service. Security is actually a major concern to SOC practitioners. SOC technologies have allowed companies to expose applications, internally and externally, and, for that reason are heavily used. However, in some distributed environments, software services and process engines can be alarmingly vulnerable. Service-based processes can expose organizations to a considerable amount of security risk and dependability degradation. We propose to use a model-driven approach for solving this problem. During system design, paradigms such as abstraction, separation of concerns and language definition are used to define a model of the service composition with security properties. This model is transformed into an execution model. We present a generative environment applying these principles for service composition. This environment has been built as part of the SODA European project and validated on several industrial use cases
Zerkane, Salaheddine. "Security Analysis and Access Control Enforcement through Software Defined Networks." Thesis, Brest, 2018. http://www.theses.fr/2018BRES0057/document.
Повний текст джерелаSoftware Defined Networking (SDN) is an emerging paradigm that promises to resolve the limitations of the conventional network architecture.SDN and cyber security have a reciprocal relationship. In this thesis, we study and explore two aspects of this relationship. On the one hand, we study security for SDN by performing a vulnerability analysis of SDN. Such security analysis is a crucial process in identifying SDN security flaws and in measuring their impacts. It is necessary for improving SDN security and for understanding its weaknesses.On the other hand, we explore SDN for security. Such an aspect of the relationship between SDN and security focusses on the advantages that SDN brings into security.The thesis designs and implements an SDN stateful firewall that transforms the Finite State Machine of network protocols to an SDN Equivalent State Machine. Besides, the thesis evaluates SDN stateful firewall and NetFilter regarding their performance and their resistance to Syn Flooding attacks.Furthermore, the thesis uses SDN orchestration for policy enforcement. It proposes a firewall policy framework to express, assess, negotiate and deploy firewall policies in the context of SDN as a Service in the cloud
Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.
Повний текст джерелаPeacock, Matthew. "Anomaly Detection in BACnet/IP managed Building Automation Systems." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2019. https://ro.ecu.edu.au/theses/2178.
Повний текст джерелаКниги з теми "Security orchestration and automation"
Lehto, Martti, and Pekka Neittaanmäki, eds. Cyber Security: Analytics, Technology and Automation. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18302-2.
Повний текст джерелаBryan, Singer, ed. Industrial automation and process control security. Boca Raton: CRC Press, 2012.
Знайти повний текст джерелаKrutz, Ronald L. Industrial automation and control system security principles. Research Triangle Park, NC: International Society of Automation (ISA), 2013.
Знайти повний текст джерелаSoper, Mark Edward. Absolute beginner's guide to home automation. Indianapolis, Ind: Que, 2005.
Знайти повний текст джерелаUnited States. Dept. of Commerce. Office of Industrial Resource Administration. Strategic Analysis Division. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Знайти повний текст джерелаDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Знайти повний текст джерелаDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Знайти повний текст джерелаDivision, United States Dept of Commerce Office of Industrial Resource Administration Strategic Analysis. National security assessment of the U.S. robotics industry. [Washington, D.C.]: U.S. Dept. of Commerce, Bureau of Export Administration, Office of Strategic Industries and Economic Security, Strategic Analysis Division, 1991.
Знайти повний текст джерелаGirardin, Pierre. La domotique. Sainte-Foy, Québec: Société d'habitation du Québec, 1994.
Знайти повний текст джерелаHuman behavior recognition technologies: Intelligent applications for monitoring and security. Hershey, PA: Information Science Reference, 2013.
Знайти повний текст джерелаЧастини книг з теми "Security orchestration and automation"
Christian, Juan, Luis Paulino, and Alan Oliveira de Sá. "A Low-Cost and Cloud Native Solution for Security Orchestration, Automation, and Response." In Information Security Practice and Experience, 115–39. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-21280-2_7.
Повний текст джерелаLing, Xiaobo, Longyun Qi, Man Li, and Jun Yan. "Research on Network Security Automation and Orchestration Oriented to Electric Power Monitoring System." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 195–206. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99191-3_15.
Повний текст джерелаMir, Abdul Wahid, and Ramkumar Ketti Ramachandran. "Implementation of Security Orchestration, Automation and Response (SOAR) in Smart Grid-Based SCADA Systems." In Sixth International Conference on Intelligent Computing and Applications, 157–69. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-1335-7_14.
Повний текст джерелаKomarek, Ales, Jakub Pavlik, and Vladimir Sobeslav. "Orchestration and Automation of NVF." In Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 664–72. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69835-9_62.
Повний текст джерелаChevalier, Yannick, Mohamed Anis Mekki, and Michaël Rusinowitch. "Orchestration under Security Constraints." In Formal Methods for Components and Objects, 23–44. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25271-6_2.
Повний текст джерелаSabharwal, Navin, and Piyush Pandey. "Automation and Orchestration of Container Monitoring." In Monitoring Microservices and Containerized Applications, 271–302. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-6216-0_9.
Повний текст джерелаCaelli, W. "Office Automation Security." In Information Security for Managers, 258–82. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-10137-5_6.
Повний текст джерелаOxer, Jonathan, and Hugh Blemings. "Security/Automation Sensors." In Practical Arduino, 81–100. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-2478-5_6.
Повний текст джерелаApaza-Condori, Jeferson, and Eveling Castro-Gutierrez. "A Heterogeneous Scalable-Orchestration Architecture for Home Automation." In Advances in Intelligent Systems and Computing, 218–34. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39445-5_17.
Повний текст джерелаKrupaviciute, Asta, and Jocelyne Fayn. "Expert Activities Automation through Enhanced Business Services Orchestration." In Software Architecture, 497–500. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-15114-9_49.
Повний текст джерелаТези доповідей конференцій з теми "Security orchestration and automation"
Zheng, Yifeng, Arindam Pal, Sharif Abuadbba, Shiva Raj Pokhrel, Surya Nepal, and Helge Janicke. "Towards IoT Security Automation and Orchestration." In 2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA). IEEE, 2020. http://dx.doi.org/10.1109/tps-isa50397.2020.00018.
Повний текст джерелаVast, Rahul, Shruti Sawant, Aishwarya Thorbole, and Vishal Badgujar. "Artificial Intelligence based Security Orchestration, Automation and Response System." In 2021 6th International Conference for Convergence in Technology (I2CT). IEEE, 2021. http://dx.doi.org/10.1109/i2ct51068.2021.9418109.
Повний текст джерелаSajid, Md Sajidul Islam, Jinpeng Wei, Basel Abdeen, Ehab Al-Shaer, Md Mazharul Islam, Walter Diong, and Latifur Khan. "SODA: A System for Cyber Deception Orchestration and Automation." In ACSAC '21: Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3485832.3485918.
Повний текст джерелаBartwal, Upendra, Subhasis Mukhopadhyay, Rohit Negi, and Sandeep Shukla. "Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots." In 2022 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 2022. http://dx.doi.org/10.1109/dsc54232.2022.9888808.
Повний текст джерелаWang, Di, Ruxia Yang, and Xianzhou Gao. "Data security compliance management and control technology based on scene orchestration." In 2021 13th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA). IEEE, 2021. http://dx.doi.org/10.1109/icmtma52658.2021.00093.
Повний текст джерелаKalliola, Aapo, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, and Tuomas Aura. "Security Wrapper Orchestration in Cloud." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3232853.
Повний текст джерелаBaouab, Aymen, Olivier Perrin, Nicolas Biri, and Claude Godart. "Security meta-services orchestration architecture." In 2009 IEEE Asia-Pacific Services Computing Conference (APSCC). IEEE, 2009. http://dx.doi.org/10.1109/apscc.2009.5394146.
Повний текст джерелаSong Luo and Malek Ben Salem. "Orchestration of software-defined security services." In 2016 ICC - 2016 IEEE International Conference on Communications Workshops (ICC). IEEE, 2016. http://dx.doi.org/10.1109/iccw.2016.7503826.
Повний текст джерелаWendland, Florian, and Christian Banse. "Enhancing NFV Orchestration with Security Policies." In ARES 2018: International Conference on Availability, Reliability and Security. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3230833.3233253.
Повний текст джерелаPotluri, Ravi, and Kristen Young. "Analytics Automation for Service Orchestration." In 2020 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 2020. http://dx.doi.org/10.1109/isncc49221.2020.9297249.
Повний текст джерелаЗвіти організацій з теми "Security orchestration and automation"
Dempsey, Kelley, Nedim Goren, Paul Eavy, and George Moore. Automation support for security control assessments:. Gaithersburg, MD: National Institute of Standards and Technology, December 2018. http://dx.doi.org/10.6028/nist.ir.8011-3.
Повний текст джерелаDempsey, Kelley, Eduardo Takamura, Paul Eavy, and George Moore. Automation support for security control assessments:. Gaithersburg, MD: National Institute of Standards and Technology, April 2020. http://dx.doi.org/10.6028/nist.ir.8011-4.
Повний текст джерелаCam-Winget, N., and L. Lorenzin. Security Automation and Continuous Monitoring (SACM) Requirements. RFC Editor, September 2017. http://dx.doi.org/10.17487/rfc8248.
Повний текст джерелаBooth, Harold, and Adam Halbardier. Trust model for security automation data 1.0 (TMSAD). Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.ir.7802.
Повний текст джерелаDempsey, Kelley, Paul Eavy, and George Moore. Automation support for security control assessments. volume 1: overview. Gaithersburg, MD: National Institute of Standards and Technology, June 2017. http://dx.doi.org/10.6028/nist.ir.8011-1.
Повний текст джерелаQuinn, S. D., D. A. Waltermire, C. S. Johnson, K. A. Scarfone, and J. F. Banghart. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2009. http://dx.doi.org/10.6028/nist.sp.800-126.
Повний текст джерелаWaltermire, D. A., S. D. Quinn, and K. A. Scarfone. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r1.
Повний текст джерелаWaltermire, D. A., S. D. Quinn, K. A. Scarfone, and A. M. Halbardier. The technical specification for the Security Content Automation Protocol (SCAP) :. Gaithersburg, MD: National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-126r2.
Повний текст джерелаWaltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. Gaithersburg, MD: National Institute of Standards and Technology, September 2018. http://dx.doi.org/10.6028/nist.cswp.09102018.
Повний текст джерелаWaltermire, David, and Jessica Fitzgerald-McKay. Transitioning to the Security Content Automation Protocol (SCAP) Version 2. Gaithersburg, MD: National Institute of Standards and Technology, 2018. http://dx.doi.org/10.6028/nist.cswp.7.
Повний текст джерела