Security and management policy specification

被引:79
|
作者
Sloman, M [1 ]
Lupu, E [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, Distributed Software Engn Sect, London SW7 2AZ, England
来源
IEEE NETWORK | 2002年 / 16卷 / 02期
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/65.993218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [31] Automatic management of network security policy
    Burns, J
    Cheng, A
    Gurung, P
    Rajagopalan, S
    Rao, P
    Rosenbluth, D
    Surendran, AV
    Martin, DM
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 12 - 26
  • [32] Policy framework for security and privacy management
    Karat, J.
    Karat, C. -M.
    Bertino, E.
    Li, N.
    Ni, Q.
    Brodie, C.
    Lobo, J.
    Calo, S. B.
    Cranor, L. F.
    Kumaraguru, P.
    Reeder, R. W.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [33] Security Policy Compliance with Violation Management
    Brunel, Julien
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Sans, Thierry
    Bodeveix, Jean-Paul
    FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 31 - 40
  • [34] Security checker architecture for policy-based security management
    Tishkov, A
    Kotenko, I
    Sidelnikova, E
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 460 - 465
  • [35] Formal Specification and Verification of Modular Security Policy Based on Colored Petri Nets
    Huang, Hejiao
    Kirchner, Helene
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (06) : 852 - 865
  • [36] Validation of a Security Policy by the Test of its Formal B Specification - a Case Study
    Ledru, Yves
    Idani, Akram
    Richier, Jean-Luc
    2015 IEEE/ACM 3RD FME WORKSHOP ON FORMAL METHODS IN SOFTWARE ENGINEERING, 2015, : 6 - 12
  • [37] How to leverage access control specification for autonomic policy management
    Vatsavai, RR
    Chakravarthy, S
    Mohania, M
    ICAC 2005: Second International Conference on Autonomic Computing, Proceedings, 2005, : 358 - 359
  • [38] Security Requirements Specification in Service-oriented Business Process Management
    Menzel, Michael
    Thomas, Ivonne
    Meinel, Christoph
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 41 - 48
  • [39] Specification for security Orchestration
    Goutam, Aradhana
    Kamal, Raj
    Ingle, Maya
    INTERNATIONAL CONFERENCE ON MODELLING OPTIMIZATION AND COMPUTING, 2012, 38 : 429 - 441
  • [40] Security specification and verification
    Fenkam, P
    16TH ANNUAL INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2001), PROCEEDINGS, 2001, : 434 - 434