Next:
List of Tables
Up:
A Framework for Adaptive
Previous:
8.4.2 IP level security
List of Figures
2.1 The adaptive security management framework
2.2 A graphical representation of the monitor object concept
2.3 A graphical representation of the decision enforcement application concept
2.4 Collection process of static data
2.5 The knowledge based system's rule-base
2.6 Bidirectional communication between the security management service and the peripheral applications
3.1 Interactions in an adaptive security management system
3.2 Layers in an IT system
3.3 In-line authentication
3.4 The ISO access control model
3.5 Example of an access control condition matrix
A.1 Security countermeasures showing decreasing returns on effort beyond the optimum (effort*, security*)
B.1 Architectural layers for security
B.2 The security encapsulation process
B.3 Different locations for the NLSP layer
(c) 1998, Filip Schepers