RESOURCE-AWARE CONFIGURATION MANAGEMENT USING XML FOR MITIGATING INFORMATION ASSURANCE VULNERABILITY

Namho Yoo

2005

Abstract

This paper suggests an XML-based configuration management for mitigating information assurance vulnerability. Once an information assurance vulnerability notice is given for a system, it is important for reducing massive system engineering efforts for configuration management. When multiple systems are updated by security patches for mitigating system vulnerability, configuration management based on system resource is trivial, in order to increase accuracy, efficiency and effectiveness of software processes. By employing XML technology, we can achieve seamless and efficient configuration management between heterogeneous system format as well as data formats in analysing and exchanging the pertinent information for information assurance vulnerability. Thus, when a system is updated to improve system vulnerability, the proposed XML-based configuration management mechanism refers to the system resource information and analyse the security model and posture of affected sustained system and minimize the propagated negative impact. Then, an executable architecture for implementation to verify the proposed scheme and algorithm and testing environment is presented to mitigate vulnerable systems for sustained system.

References

  1. Arnold, R., Bohner, S., 1993 Impact Analysis - Toward A Framework for Comparison, In Proceeding of Conference on Software Maintenance, pp 27-30, September
  2. MIL-STD-498, 1997 Software Development and Documentation, Department of Defense, December
  3. DoD-CERT, 2004, http://www.cert.mil
  4. W3C, 2000, Extensible Markup Language (XML) 1.0 , W3C Recommendation, October
  5. Yoo, N., 2004, Impact Analysis using Performance Requirement with Application Response Measurement in Sustained System, In Proceedings of the ISOneWorld Conference.
  6. Yoo, N., 2004, An XML-based Engineering Change Impact Analysis with Non-Functional Requirements, In Proceedings of International Conference on Software Engineering Research and Practice (SERP).
Download


Paper Citation


in Harvard Style

Yoo N. (2005). RESOURCE-AWARE CONFIGURATION MANAGEMENT USING XML FOR MITIGATING INFORMATION ASSURANCE VULNERABILITY . In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 972-8865-19-8, pages 518-521. DOI: 10.5220/0002540005180521


in Bibtex Style

@conference{iceis05,
author={Namho Yoo},
title={RESOURCE-AWARE CONFIGURATION MANAGEMENT USING XML FOR MITIGATING INFORMATION ASSURANCE VULNERABILITY},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2005},
pages={518-521},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002540005180521},
isbn={972-8865-19-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - RESOURCE-AWARE CONFIGURATION MANAGEMENT USING XML FOR MITIGATING INFORMATION ASSURANCE VULNERABILITY
SN - 972-8865-19-8
AU - Yoo N.
PY - 2005
SP - 518
EP - 521
DO - 10.5220/0002540005180521