Skip to content

Commit 55495a2

Browse files
Template and outline
1 parent e82fa57 commit 55495a2

File tree

2 files changed

+52
-0
lines changed

2 files changed

+52
-0
lines changed

MUSESDevGuide.bib

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
@article{deliverable21,
2+
title={D2.1 Architecture and Prototype Specification},
3+
author={Henrik Arfwedson, Markus Burvall, Yasir Ali, Antonio Mora, Paloma de las Cuevas, Sergio Zamarripa, Jean-Marc Seigneur, Zardosht Hodaie}
4+
}

MUSESDevGuide.tex

Lines changed: 48 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,48 @@
1+
\documentclass[a4paper,11pt]{book}
2+
\usepackage[T1]{fontenc}
3+
\usepackage[utf8]{inputenc}
4+
\usepackage{lmodern}
5+
\usepackage[UKenglish]{babel}
6+
\usepackage[UKenglish]{isodate}
7+
8+
\addto{\captionsspanish}{\renewcommand{\chaptername}{Chapter}}
9+
\addto{\captionsspanish}{\renewcommand{\appendixname}{Appendix}}
10+
\addto{\captionsspanish}{\renewcommand{\indexname}{Appendix}}
11+
\addto{\captionsspanish}{\renewcommand{\contentsname}{Appendix}}
12+
\addto{\captionsspanish}{\renewcommand{\bibname}{Bibliography}}
13+
14+
\title{MUSES Developer Guide}
15+
\author{Yasir Ali, Paloma de las Cuevas Delgado, ...}
16+
\cleanlookdateon
17+
18+
\begin{document}
19+
20+
\maketitle
21+
\tableofcontents
22+
23+
\chapter{Preliminaries}
24+
25+
This guide describes everything a developer needs to know to start developing for the MUSES system.
26+
27+
The MUSES System \cite{deliverable21} has been developed following a client-server architecture.
28+
29+
The client or device side is related to the end user, usually an employee who uses a mobile or portable, and possibly
30+
personal, device to access enterprise resources. From the enterprise security point of view, the system should prevent the user from using the device incorrectly. Therefore, MUSES monitors the user's context and behaviour, and controls their actions, allowing or forbidding them depending on those policies.
31+
32+
The MUSES server side is controlled by an enterprise security manager, the Chief Security Officer (CSO), who defines the security policies to be considered in the system. The security policies are used by the MUSES server to identify which behaviour is allowed and which one is not. The server then receives, stores, and processes all the gathered information from users' devices. After that, it analyses the data, performing a real-time risk and trust analysis. In addition, the system detects policy violations through event correlation techniques, adapting to changes in the environment, as well as non-secure user behaviours.
33+
34+
\chapter{Building MUSES Client}
35+
36+
37+
\chapter{Building MUSES Server}
38+
39+
40+
\chapter{Creating and integrating new sensors}
41+
42+
43+
\chapter{Installing MUSES}
44+
45+
\bibliographystyle{abbrv}
46+
\bibliography{MUSESDevGuide}
47+
48+
\end{document}

0 commit comments

Comments
 (0)