Abstract | ||
---|---|---|
There are settings where we have to collaborate with individuals and organizations who, while not being enemies, should not be fully trusted. Collaborators must be authorized to access information systems that contain information that they should be able to receive. However, these systems typically also contain information that should be withheld. Collaborations can be rapidly created, requiring dynamic alterations to security policies. Classifying data to cover all current and possible access privileges is both awkward and costly, and always unreliable. |
Year | DOI | Venue |
---|---|---|
2000 | 10.1007/0-306-47008-X_1 | DBSec |
Keywords | Field | DocType |
protecting information,information system,security policy | Internet privacy,Network security policy,Application security,Information security standards,Computer security,Certified Information Security Manager,Information security,Information security management,Security policy,Security information and event management,Business | Conference |
ISBN | Citations | PageRank |
0-7923-7514-9 | 5 | 0.58 |
References | Authors | |
15 | 1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Gio Wiederhold | 1 | 4260 | 1502.89 |