Deriving Authority from Security Policy Report by Peter F . Linington

نویسنده

  • Peter F. Linington
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Policy-based Model-Driven Security Framework

The adoption of a model-driven approach to the construction of applications places the focus on business logic and takes it away from detailed middleware mechanisms. It also opens new opportunities for more detailed and more dynamic control of non-functional properties. This position statement illustrates the possibilities by considering the ways in which maintenance of security infrastructure ...

متن کامل

Trust management in the public-key infrastructure

Public-key infrastructure manages trust in exchanges conducted by email, over the web and by other electronic means. The principal elements used for maintaining that trust are the contents of the certificates and the security safeguards in effect in the environments of the various parties involved. These two elements are derived by a risk management procedure from the business purpose of the ex...

متن کامل

Policies in communities: extending the ODP enterprise viewpoint

The Reference Model of Open Distributed Processing (RM-ODP) introduces the notion of an enterprise viewpoint and provides a minimum set of concepts for structuring enterprise language specifications. This paper extends the RM-ODP enterprise concepts by exploring how policy can be modelled within and between communities. A model for enterprise behaviour based on physical and social actions is pr...

متن کامل

An authorization and access control scheme for pervasive computing

The existence of a central security authority is too restrictive for pervasive computing environments. Existing distributed security schemes fail in a pervasive computing environment with limited terminals. Better fitted are schemes, that do not rely on the presence of a central security authority, yet allows for the application of a common security policy. This paper presents such a distribute...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004