A Security Policy Infrastructure for Tactical Service Oriented Architectures. / Gkioulos, Vasileios; Wolthusen, Stephen.

Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, 2017. p. 37-51 (Lecture Notes in Computer Science; Vol. 10166).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

A Security Policy Infrastructure for Tactical Service Oriented Architectures. / Gkioulos, Vasileios; Wolthusen, Stephen.

Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, 2017. p. 37-51 (Lecture Notes in Computer Science; Vol. 10166).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Gkioulos, V & Wolthusen, S 2017, A Security Policy Infrastructure for Tactical Service Oriented Architectures. in Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Lecture Notes in Computer Science, vol. 10166, Springer-Verlag, pp. 37-51. https://doi.org/10.1007/978-3-319-61437-3_3

APA

Gkioulos, V., & Wolthusen, S. (2017). A Security Policy Infrastructure for Tactical Service Oriented Architectures. In Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016) (pp. 37-51). (Lecture Notes in Computer Science; Vol. 10166). Springer-Verlag. https://doi.org/10.1007/978-3-319-61437-3_3

Vancouver

Gkioulos V, Wolthusen S. A Security Policy Infrastructure for Tactical Service Oriented Architectures. In Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag. 2017. p. 37-51. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-319-61437-3_3

Author

Gkioulos, Vasileios ; Wolthusen, Stephen. / A Security Policy Infrastructure for Tactical Service Oriented Architectures. Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, 2017. pp. 37-51 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{00d93c201a1047159da455ad417561e3,
title = "A Security Policy Infrastructure for Tactical Service Oriented Architectures",
abstract = "Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant limitations to the functionalities and efficiency of current generic security policy frameworks.Earlier studies have provided a risk analysis of tactical service oriented architectures (SOA), and a set of fine-grained protection goals in correspondence to the aforementioned constraints. Furthermore, web ontology language has been identified as a suitable mediator towards the requirements and opportunities imposed by tactical SOA. Thus, in this article we present a security policy framework dedicated to tactical networks, as it has been developed within the project TACTICS.",
keywords = "Ad-Hoc Policy Security Service oriented architectures Tactical networks ",
author = "Vasileios Gkioulos and Stephen Wolthusen",
year = "2017",
month = jun,
day = "10",
doi = "10.1007/978-3-319-61437-3_3",
language = "English",
isbn = "978-3-319-61436-6",
series = "Lecture Notes in Computer Science",
publisher = "Springer-Verlag",
pages = "37--51",
booktitle = "Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016)",

}

RIS

TY - GEN

T1 - A Security Policy Infrastructure for Tactical Service Oriented Architectures

AU - Gkioulos, Vasileios

AU - Wolthusen, Stephen

PY - 2017/6/10

Y1 - 2017/6/10

N2 - Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant limitations to the functionalities and efficiency of current generic security policy frameworks.Earlier studies have provided a risk analysis of tactical service oriented architectures (SOA), and a set of fine-grained protection goals in correspondence to the aforementioned constraints. Furthermore, web ontology language has been identified as a suitable mediator towards the requirements and opportunities imposed by tactical SOA. Thus, in this article we present a security policy framework dedicated to tactical networks, as it has been developed within the project TACTICS.

AB - Tactical networks are affected by multiple constraints related to the limited node characteristics and the availability of resources. These constraints within the highly dynamic tactical environment, impose significant limitations to the functionalities and efficiency of current generic security policy frameworks.Earlier studies have provided a risk analysis of tactical service oriented architectures (SOA), and a set of fine-grained protection goals in correspondence to the aforementioned constraints. Furthermore, web ontology language has been identified as a suitable mediator towards the requirements and opportunities imposed by tactical SOA. Thus, in this article we present a security policy framework dedicated to tactical networks, as it has been developed within the project TACTICS.

KW - Ad-Hoc Policy Security Service oriented architectures Tactical networks

U2 - 10.1007/978-3-319-61437-3_3

DO - 10.1007/978-3-319-61437-3_3

M3 - Conference contribution

SN - 978-3-319-61436-6

T3 - Lecture Notes in Computer Science

SP - 37

EP - 51

BT - Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016)

PB - Springer-Verlag

ER -