TCO-aware provisioning of information security infrastructure
نویسندگان
چکیده
© TCO-aware provisioning of information security infrastructure Philip Robinson, Bryan Stephenson HP Laboratories HPL-2008-195 TCO automated security infrastructure provisioning As IT infrastructure proliferates, higher-level security controls must become interpretable and enforceable by machines, largely without human intervention. We establish a single provisioning model and process for addressing security and the Total Cost of Ownership (TCO). The innovation is the combination of these two aspects of provisioning hosted software in the same process and model. Provisions are made for comparing alternatives and justifying design and mechanism-selection decisions, based on their impact on the TCO of the system being protected. While TCO calculations may be estimations and qualitative, quantitative arguments can still be incorporated to validate all security infrastructure provisioning decisions made with respect to both security and TCO. External Posting Date: November 21, 2008 [Fulltext] Approved for External Publication Internal Posting Date: November 21, 2008 [Fulltext] Copyright 2008 Hewlett-Packard Development Company, L.P. TCO-aware provisioning of information security infrastructure Philip Robinson SAP Research Belfast, Northern Ireland [email protected] Bryan Stephenson HP Laboratories Palo Alto, California [email protected]
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملArchitectural Aspects of Qos-aware Personal Networks Architectural Aspects of Qos-aware Personal Networks
Personal Networks (PN) are future communication systems that combine wireless and infrastructure based networks to provide users a variety of services anywhere and anytime. PNs introduce new design challenges due to the heterogeneity of the involved technologies, the need for self-organization, the dynamics of the system composition, the application-driven nature, the co-operation with infrastr...
متن کاملSecurity Infrastructure for Dynamically Provisioned Cloud Infrastructure Services
S. Pearson and G. Yee (eds.), Privacy and Security for Cloud Computing, Computer Communications and Networks, DOI 10.1007/978-1-4471-4189-1_5, © Springer-Verlag London 2012 Abstract This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. Th...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملThe W4 Model and Infrastructure for Context-aware Browsing The World
The imminent mass deployment of pervasive computing technologies such as sensor networks and RFID tags, together with the increasing participation of the Web community in feeding geo-located information within tools such as Google Earth, will soon make available an incredible amount of information about the physical and social worlds and their processes. This opens up the possibility of exploit...
متن کامل