Information security policy architecture

被引:1
作者
Alam, Mehtab [1 ]
Bokhari, M. U. [2 ]
机构
[1] INMANTEC, Ghaziabad, Uttar Pradesh, India
[2] Aligarh Muslim Univ, Aligarh, Uttar Pradesh, India
来源
ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS | 2007年
关键词
D O I
10.1109/ICCIMA.2007.275
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. Sound security policies architecture protects organization from attacks as well as accidental internal leakage of information, and data mishandling. This paper presents an architecture which deals the policies implemented at different level in an organization for secure and smooth functioning of business.
引用
收藏
页码:120 / +
页数:2
相关论文
共 50 条
  • [21] Security architecture for federated cooperative information systems
    Bieber, P
    Raujol, D
    Siron, P
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 208 - 216
  • [22] A SECURITY ARCHITECTURE FOR INFORMATION ASSURANCE AND AVAILABILITY IN MANETS
    Stavrou, Angelos
    Ghosh, Anup K.
    2008 IEEE MILITARY COMMUNICATIONS CONFERENCE: MILCOM 2008, VOLS 1-7, 2008, : 944 - +
  • [23] Using Architecture to Reason about Information Security
    Chong, Stephen
    van der Meyden, Ron
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (02)
  • [24] Research on Architecture of Information Security in Enterprise Portal
    Wang, Wei
    Wang, Ying
    2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 420 - 424
  • [25] Architecture of Information Security Policies: A Content Analysis
    Lopes, Isabel
    Oliveira, Pedro
    NEW ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 1, 2016, 444 : 493 - 502
  • [26] A security architecture for interconnecting health information systems
    Gritzalis, D
    Lambrinoudakis, C
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2004, 73 (03) : 305 - 309
  • [27] Architecture of an Intelligent System for Information Security Management
    Jafarov, Zafar
    2013 7TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2013, : 181 - +
  • [28] Security architecture of large scale information systems
    Köprülü, T
    Çaglar, H
    PROCEEDINGS OF THE IEEE 12TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE, 2004, : 7 - 13
  • [29] Information security policy's impact on reporting security incidents
    Wiant, TL
    COMPUTERS & SECURITY, 2005, 24 (06) : 448 - 459
  • [30] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695