Security and management policy specification

被引:79
|
作者
Sloman, M [1 ]
Lupu, E [1 ]
机构
[1] Univ London Imperial Coll Sci Technol & Med, Dept Comp, Distributed Software Engn Sect, London SW7 2AZ, England
来源
IEEE NETWORK | 2002年 / 16卷 / 02期
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1109/65.993218
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Policies are rules governing the choices in behavior of a system. They are increasingly being used as a means of implementing flexible and adaptive systems for management of Internet services, networks, and security systems. There is also a need for a common specification of security policy for large-scale multi-organizational systems where access control is implemented in a variety of heterogeneous components. In this article we survey both security and management policy specification approaches, concentrating on practical systems in which the policy specification can be directly translated into an implementation.
引用
收藏
页码:10 / 19
页数:10
相关论文
共 50 条
  • [41] A Management Specification for Data Sharing Security in the System Construction of Smart Mine
    Wang, Haitao
    Tan, Lina
    Zhang, Yang
    Gong, Qiwen
    Zhang, Shan
    Ren, Yanan
    He, Tao
    Security and Communication Networks, 2023, 2023
  • [42] Security policy management for healthcare system network
    Lee, K
    Jiang, Z
    Kim, S
    Kim, S
    HEALTHCOM 2005: 7TH INTERNATIONAL WORKSHOP ON ENTERPRISE NETWORKING AND COMPUTING IN HEALTHCARE INDUSTRY, PROCEEDINGS, 2005, : 289 - 292
  • [43] Policy-driven model for security management
    Boudaoud, K
    McCathieNevile, C
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, 2003, 107 : 419 - 424
  • [44] MASTER as a Security Management Tool for Policy Compliance
    Crispo, Bruno
    Gheorghe, Gabriela
    Di Giacomo, Valentina
    Presenza, Domenico
    TOWARDS A SERVICE-BASED INTERNET, 2010, 6481 : 213 - +
  • [45] Integrating Advanced Security Certification and Policy Management
    Bezzi, Michele
    Damiani, Ernesto
    Paraboschi, Stefano
    Plate, Henrik
    CYBER SECURITY AND PRIVACY, 2013, 182 : 55 - 66
  • [46] Multidimensional security policy management for dynamic coalitions
    Patz, G
    Condell, M
    Krishnan, R
    Sanchez, L
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL II, PROCEEDINGS, 2001, : 41 - 54
  • [47] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +
  • [48] A survey on policy languages in network and security management
    Han, Weili
    Lei, Chang
    COMPUTER NETWORKS, 2012, 56 (01) : 477 - 489
  • [49] Network security project management: A security policy-based approach
    Krichene, Jihene
    Boudriga, Noureddine
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 784 - 789
  • [50] Security Policy Refinement: High-Level Specification to Low-Level Implementation
    Yang, Xia
    Alves-Foss, Jim
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 502 - 511