Abstract | ||
---|---|---|
The goal of this paper is to present a study of the compatibility of policies, security or other. Two policies are said to be compatible at a given system if the system behaviours satisfy the requirements of both policies. Incompatibility can be a result of the environment in which the system is intended to operate, or, of the actual behavioural requirements on the system and its components. We introduce a means of assessing the compatibility of policies, and the requirements for compatible policies, in a closed system model. |
Year | DOI | Venue |
---|---|---|
1994 | 10.1145/191177.191243 | ACM Conference on Computer and Communications Security |
Keywords | Field | DocType |
system behaviour,compatible policy,closed system model,actual behavioural requirement,access control,audit,closed system,satisfiability,security,intrusion | Audit,Intrusion,Compatibility (mechanics),Computer security,Information security standards,Computer science,Access control,System model,Computer security model | Conference |
ISBN | Citations | PageRank |
0-89791-732-4 | 3 | 0.57 |
References | Authors | |
4 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Heather M. Hinton | 1 | 4 | 0.97 |
E. Stewart Lee | 2 | 60 | 9.22 |