Security and management policy specification

被引:79
作者
Sloman, M [1 ]
Lupu, E [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, Distributed Software Engn Sect, London SW7 2AZ, England
来源
IEEE NETWORK | 2002年 / 16卷 / 02期
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/65.993218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 32 条
[11]  
*DMTF INC, 1999, COMM INF MOD CIM SPE
[12]  
DULAY N, 2001, P IEE IFIP INT S INT
[13]   Supporting reconfigurable security policies for mobile programs [J].
Hashii, B ;
Malabarba, S ;
Pandey, R ;
Bishop, M .
COMPUTER NETWORKS, 2000, 33 (1-6) :77-93
[14]  
HERZBERG A, 2000, IEEE S SEC PRIV OAKL
[15]  
*ISO IEC, 1999, N2187 ISOIEC JTC1SC7
[16]  
JJAJODIA S, 1997, IEEE S SEC PRIV OAKL, P31
[17]  
KONSTANTINOS P, 1999, IEE COMMUN SURVEYS T, V2
[18]  
Linington P. F., 1999, Proceedings Third International Enterprise Distributed Object Computing. Conference (Cat. No.99EX366), P72, DOI 10.1109/EDOC.1999.792051
[19]  
Lobo J, 1999, SIXTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-99)/ELEVENTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE (IAAI-99), P291
[20]   Towards a role-based framework for distributed systems management [J].
Lupu E.C. ;
Sloman M. .
Journal of Network and Systems Management, 1997, 5 (1) :5-30