Abstract | ||
---|---|---|
What I’m talking about is simultaneously enforcing more than one security policy. What I’m really talking about is when it’s
over a network where you have two machines that are connected, and you have a security policy in each end. I thought it would
be useful to try and decide what we mean by a security policy. It’s a directive on the goals for access and integrity and
other things, it’s an objective or a goal. What I’m going to do in this talk is to very quickly review a number of known security
policies. I picked on ones that have been published, that are reasonably well known. I am then going to demonstrate that these
policies are inconsistent and any attempt to enforce both of them at the same time is doomed.
|
Year | DOI | Venue |
---|---|---|
1999 | 10.1007/10720107_2 | Security Protocols Workshop |
Keywords | Field | DocType |
composing security properties | Internet privacy,Computer science,Computer security,Directive,Security analysis,Security properties,Security policy | Conference |
Volume | ISSN | ISBN |
1796 | 0302-9743 | 3-540-67381-4 |
Citations | PageRank | References |
1 | 0.38 | 1 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
E. Stewart Lee | 1 | 60 | 9.22 |