Abstract | ||
---|---|---|
In any organization, there are generally several applications in place and usually, each application has its own Security Policy. In fact, the ability to define multiple Security Policies is needed in several cases. Moreover, heterogeneous security mechanisms can be used to achieve security objectives. However, implementing a unified security policy for all theses mechanisms becomes then unfeasible. Hence, a formal representation of security policies is needed. Furthermore, since theses policies are generally written by different people, they may have conflicts. The main contribution of this paper concerns then, the formalization of security policies conflicts as well as their detection and resolution. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/ICNS.2009.24 | ICNS |
Keywords | Field | DocType |
multi security policies,unified security policy,security policies conflict,communication networks,theses policy,different people,security policy,security objective,theses mechanism,multiple security policies,own security policy,heterogeneous security mechanism,information security,silicon,combination,probability density function,communication network,data mining,security | Security convergence,Security through obscurity,Information security standards,Computer science,Asset (computer security),Computer security,Computer network,Security service,Cloud computing security,Security information and event management,Computer security model,Distributed computing | Conference |
Citations | PageRank | References |
3 | 0.49 | 14 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ryma Abassi | 1 | 24 | 10.45 |
Sihem Guemara El Fatmi | 2 | 40 | 13.24 |