Skip to content

Commit f73d17a

Browse files
author
Yasir Ali
committed
Update MUSESDevGuide.tex
1 parent 0d12725 commit f73d17a

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

MUSESDevGuide.tex

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -27,12 +27,12 @@ \chapter{Introduction}
2727

2828
This guide describes everything a developer needs to know to start developing for the MUSES system.
2929

30-
The MUSES System \cite{deliverable21} has been developed following a client-server architecture.
30+
The MUSES System \cite{deliverable21} has been developed based on the client-server architecture.
3131

32-
The client or device side is related to the end user, usually an employee who uses a mobile or portable, and possibly
33-
personal, device to access enterprise resources. From the enterprise security point of view, the system should prevent the user from using the device incorrectly. Therefore, MUSES monitors the user's context and behaviour, and controls their actions, allowing or forbidding them depending on those policies.
32+
The client or device is related to the end user, usually an employee who uses a mobile or a portable device possibly
33+
personal device to access enterprise resources. From the enterprise security point of view, the system should prevent the user from using the device incorrectly and make sure that the employee follows the company policees. Therefore, MUSES monitors the user's context and behaviour, and controls their actions, allowing or forbidding them depending on company policies.
3434

35-
The MUSES server side is controlled by an enterprise security manager, the Chief Security Officer (CSO), who defines the security policies to be considered in the system. The security policies are used by the MUSES server to identify which behaviour is allowed and which one is not. The server then receives, stores, and processes all the gathered information from users' devices. After that, it analyses the data, performing a real-time risk and trust analysis. In addition, the system detects policy violations through event correlation techniques, adapting to changes in the environment, as well as non-secure user behaviours.
35+
The MUSES server is controlled by an enterprise security manager, the Chief Security Officer (CSO), who defines the security policies to be considered in the MUSES system. The security policies are used by the MUSES server to identify which behaviour is allowed and which one is not. The server then receives, stores, and processes all the gathered information from users' devices. After that, it analyzes the data, performing a real-time risk and trust analysis. In addition, the system detects policy violations through event correlation techniques, adapting to changes in the environment, as well as non-secure user behaviours.
3636

3737
\section{MUSES on Github}
3838
\label{sec:musesgit}

0 commit comments

Comments
 (0)