Security and management policy specification

被引:79
|
作者
Sloman, M [1 ]
Lupu, E [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, Distributed Software Engn Sect, London SW7 2AZ, England
来源
IEEE NETWORK | 2002年 / 16卷 / 02期
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/65.993218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [1] Security policy specification in logic
    Barker, S
    IC-AI'2000: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE, VOL 1-III, 2000, : 1299 - 1304
  • [2] Security policy specification for home network
    Kim, Geon Woo
    Lee, Deok Gyu
    Han, Jong Wook
    Kim, Sang Wook
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2009, 4 (06) : 372 - 378
  • [3] SPECIFICATION AND VALIDATION OF A SECURITY POLICY MODEL
    BOSWELL, A
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (02) : 63 - 68
  • [4] Security policy specification and integration in business collaboration
    He, Daisy Daiqin
    Yang, Jian
    2007 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2007, : 20 - +
  • [5] A policy specification language for trust management
    Zhang Hongqi
    Zhou Jing
    ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, PROCEEDINGS, 2007, : 517 - 519
  • [6] Autonomic management policy specification in Tune
    Broto, Laurent
    Hagimont, Daniel
    Stolf, Patricia
    Depalma, Noel
    Temate, Suzy
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 1658 - +
  • [7] A flexible method for information system security policy specification
    Ortalo, R
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 67 - 84
  • [8] Specification and enforcement of flexible security policy for active cooperation
    Sun, Yuqing
    Gong, Bin
    Meng, Xiangxu
    Lin, Zongkai
    Bertino, Elisa
    INFORMATION SCIENCES, 2009, 179 (15) : 2629 - 2642
  • [9] The Policy Machine for security policy management
    Hu, VC
    Frincke, DA
    Ferraiolo, DF
    COMPUTATIONAL SCIENCE -- ICCS 2001, PROCEEDINGS PT 2, 2001, 2074 : 494 - 503
  • [10] Policy specification and matching for business performance management
    Jeng, JJ
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 315 - 322