next up previous contents
Next: 3.1 Interactions in adaptive Up: A Framework for Adaptive Previous: 2.2.0.3 Communications security

3. Adaptive security system applications

In the previous chapter we discussed the components of an adaptive security management system. Clearly, these various components interact to form a system that tries to find weaknesses, detect intrusion and abuse, and take countermeasures. In the following parts we describe a number of ways in which some of these components interact to provide security services. In the second section we briefly focus on formal security models and give an example of how such a model is used by the security management system.



 

(c) 1998, Filip Schepers