Mostrar el registro sencillo del ítem

Artículo

dc.creatorVarela Vaca, Ángel Jesúses
dc.creatorMartínez Gasca, Rafaeles
dc.creatorCeballos Guerrero, Rafaeles
dc.creatorGómez López, María Teresaes
dc.creatorBernáldez Torres, Pedroes
dc.date.accessioned2020-06-14T14:23:51Z
dc.date.available2020-06-14T14:23:51Z
dc.date.issued2019
dc.identifier.citationVarela Vaca, Á.J., Martínez Gasca, R., Ceballos Guerrero, R., Gómez López, M.T. y Bernáldez Torres, P. (2019). CyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lines. Applied Sciences, 9 (24)
dc.identifier.issn2076-3417es
dc.identifier.urihttps://hdl.handle.net/11441/97780
dc.description.abstractCybersecurity attacks affect the compliance of cybersecurity policies of the organisations. Such disadvantages may be due to the absence of security configurations or the use of default configuration values of software products and systems. The complexity in the configuration of products and systems is a known challenge in the software industry since it includes a wide range of parameters to be taken into account. In other contexts, the configuration problems are solved using Software Product Lines. This is the reason why in this article the framework Cybersecurity Software Product Line (CyberSPL) is proposed. CyberSPL is based on a methodology to design product lines to verify cybersecurity policies according to the possible configurations. The patterns to configure the systems related to the cybersecurity aspects are grouped by defining various feature models. The automated analysis of these models allows us to diagnose possible problems in the security configurations, reducing or avoiding them. As support for this proposal, a multi-user and multi-platform solution has been implemented, enabling setting a catalogue of public or private feature models. Moreover, analysis and reasoning mechanisms have been integrated to obtain all the configurations of a model, to detect if a configuration is valid or not, including the root cause of problems for a given configuration. For validating the proposal, a real scenario is proposed where a catalogue of four different feature models is presented. In this scenario, the models have been analysed, different configurations have been validated, and several configurations with problems have been diagnosed.es
dc.description.sponsorshipMinisterio de Ciencia y Tecnología RTI2018-094283-B-C33es
dc.formatapplication/pdfes
dc.format.extent28es
dc.language.isoenges
dc.publisherMDPIes
dc.relation.ispartofApplied Sciences, 9 (24)
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectConfigurationes
dc.subjectVariabilityes
dc.subjectSoftware product linees
dc.subjectSecurity policieses
dc.subjectCompliancees
dc.subjectFeature modelses
dc.titleCyberSPL: Framework for the verification of cybersecurity policy compliance of system configurations using software product lineses
dc.typeinfo:eu-repo/semantics/articlees
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDRTI2018-094283-B-C33es
dc.relation.publisherversionhttps://www.mdpi.com/2076-3417/9/24/5364es
dc.identifier.doi10.3390/app9245364es
dc.journaltitleApplied Scienceses
dc.publication.volumen9es
dc.publication.issue24es
dc.contributor.funderMinisterio de Ciencia Y Tecnología (MCYT). Españaes

FicherosTamañoFormatoVerDescripción
applsci-09-05364-v2.pdf5.132MbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional