Skip to content

Commit bc1c4af

Browse files
2 parents f9aa255 + a09c347 commit bc1c4af

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

MUSESDevGuide.tex

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ \chapter{Introduction}
2727

2828
This guide describes everything a developer needs to know to start developing for the MUSES system.
2929

30-
The MUSES System \cite{deliverable21} has been developed following a client-server architecture.
30+
The MUSES System \cite{deliverable21} has been developed based on the client-server architecture.
3131

32-
The client or device side is related to the end user, usually an employee who uses a mobile or portable, and possibly
33-
personal, device to access enterprise resources. From the enterprise security point of view, the system should prevent the user from using the device incorrectly. Therefore, MUSES monitors the user's context and behaviour, and controls their actions, allowing or forbidding them depending on those policies.
32+
The client or device is related to the end user, usually an employee who uses a mobile or a portable device possibly
33+
personal device to access enterprise resources. From the enterprise security point of view, the system should prevent the user from using the device incorrectly and make sure that the employee follows the company policees. Therefore, MUSES monitors the user's context and behaviour, and controls their actions, allowing or forbidding them depending on company policies.
3434

35-
The MUSES server side is controlled by an enterprise security manager, the Chief Security Officer (CSO), who defines the security policies to be considered in the system. The security policies are used by the MUSES server to identify which behaviour is allowed and which one is not. The server then receives, stores, and processes all the gathered information from users' devices. After that, it analyses the data, performing a real-time risk and trust analysis. In addition, the system detects policy violations through event correlation techniques, adapting to changes in the environment, as well as non-secure user behaviours.
35+
The MUSES server is controlled by an enterprise security manager, the Chief Security Officer (CSO), who defines the security policies to be considered in the MUSES system. The security policies are used by the MUSES server to identify which behaviour is allowed and which one is not. The server then receives, stores, and processes all the gathered information from users' devices. After that, it analyzes the data, performing a real-time risk and trust analysis. In addition, the system detects policy violations through event correlation techniques, adapting to changes in the environment, as well as non-secure user behaviours.
3636

3737
\section{MUSES on Github}
3838
\label{sec:musesgit}
@@ -42,7 +42,7 @@ \section{MUSES on Github}
4242
\begin{description}
4343
\item[Muses-Developer-Guide] Repository with the TeX files which consist of a manual for users that may want to develop for the MUSES project.
4444
\item[Muses-Security-Quiz]
45-
\item[MusesCommon]
45+
\item[MusesCommon] This repository contain the java classes common in client and server projects to reduce duplication of classes in projects.
4646
\item[MusesServer] This repository contains all the files in the Java-Maven MUSES server project.
4747
\item[MusesClient] Repository containing the first prototype of the MUSES client, developed for Android.
4848
\item[MusesSituationPredictionStudy]

0 commit comments

Comments
 (0)