Title
Composing Security Properties
Abstract
What I’m talking about is simultaneously enforcing more than one security policy. What I’m really talking about is when it’s over a network where you have two machines that are connected, and you have a security policy in each end. I thought it would be useful to try and decide what we mean by a security policy. It’s a directive on the goals for access and integrity and other things, it’s an objective or a goal. What I’m going to do in this talk is to very quickly review a number of known security policies. I picked on ones that have been published, that are reasonably well known. I am then going to demonstrate that these policies are inconsistent and any attempt to enforce both of them at the same time is doomed.
Year
DOI
Venue
1999
10.1007/10720107_2
Security Protocols Workshop
Keywords
Field
DocType
composing security properties
Internet privacy,Computer science,Computer security,Directive,Security analysis,Security properties,Security policy
Conference
Volume
ISSN
ISBN
1796
0302-9743
3-540-67381-4
Citations 
PageRank 
References 
1
0.38
1
Authors
1
Name
Order
Citations
PageRank
E. Stewart Lee1609.22