Security and management policy specification

被引:79
|
作者
Sloman, M [1 ]
Lupu, E [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, Distributed Software Engn Sect, London SW7 2AZ, England
来源
IEEE NETWORK | 2002年 / 16卷 / 02期
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/65.993218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [11] Specification of a Policy Based Network Management architecture
    Berto-Monleon, Ricardo
    Casini, Enrico
    van Engelshoven, Rob
    Goode, Rob
    Tuchs, Klaus-Dieter
    Halmai, Tamas
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1393 - 1398
  • [12] A Declarative Approach for Easy Specification and Automated Enforcement of Security Policy
    Hamdi, Hedi
    Bouhoula, Adel
    Mosbah, Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 60 - 71
  • [13] Ontology-based policy specification and management
    Nejdl, W
    Olmedilla, D
    Winslett, M
    Zhang, CC
    SEMANTIC WEB: RESEARCH AND APPLICATIONS, PROCEEDINGS, 2005, 3532 : 290 - 302
  • [14] Policy specification and enforcement for detection of security violations in a mail service
    Murali, A.
    Rao, M.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 172 - +
  • [15] Security Policy Specification Templates for Critical Infrastructure Services in the Cloud
    Rudolph, Manuel
    Schwarz, Reinhard
    Jung, Christian
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 61 - 66
  • [16] Analysis of policy management models and specification languages
    Aib, I
    Agoulmine, N
    Fonseca, MS
    Pujolle, G
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY II, 2003, 133 : 26 - 50
  • [17] Policy specification and architecture for quality of service management
    Muruganantha, N
    Lutfiyya, H
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 535 - 548
  • [18] Security Engine Management of Router based on Security Policy
    Jo, Su Hyung
    Kim, Ki Young
    Lee, Sang Ho
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 116 - 119
  • [19] Formal Specification and Verification of an Extended Security Policy Model for Database Systems
    Hong, Zhu
    Yi, Zhu
    Li Chenyang
    Jie, Shi
    Ge, Fu
    Wang Yuanzhen
    APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, : 132 - 141
  • [20] A Model-Based Framework for Security Policy Specification, Deployment and Testing
    Mouelhi, Tejeddine
    Fleurey, Franck
    Baudry, Benoit
    Le Traon, Yves
    MODEL DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2008, 5301 : 537 - 552