Click here for full text:
Infrastructure Security Modelling for Utility Computing
Keyword(s): utility computing; reachability; security modelling; object oriented logical models; security properties; risk analysis
Abstract: In this paper we consider how logic-based object modelling techniques may be used to help Utility Providers and their customers obtain insight concerning the security characteristics of utility infrastructure and networked systems. We briefly describe two modelling tool prototypes that were built and the underlying technology they used. Starting from an asset-management view of utility computing infrastructure, we realised that the more interesting questions lie not entirely with the infrastructure itself, but in the way that it is used and deployed within organisations as part of a service-oriented delivery framework. As a result, it is clearly necessary to represent the business process structure and correlate this with the underlying utility infrastructure and the people that interact with these services and systems.
Back to Index