Implementing Security Policies using the Safe Areas of Computation Approach

نویسندگان

  • André L. M. dos Santos
  • Richard A. Kemmerer
چکیده

The World Wide Web is playing a major role in reducing business costs and in providing convenience to users. Digital Libraries capitalize on this technology to distribute documents that are stored in their servers. Online banks capitalize on this technology to reduce their operating costs and to offer 24 hours services to their clients. These two services are examples of services that require a high degree of security. Therefore, they require a higher level of protection than the existing technologies commonly used in the World Wide Web. An approach that can be used to protect Internet transactions, called Safe Areas of Computation, was described in [DK99]. This paper describes the access control lists used by the Safe Areas of Computation approach, the operations on these access control lists supported by the approach, and how the access control lists can be customized for implementing many different security policies. This paper also describes example policies that can be used to protect Digital Libraries and Online Bank services. The paper uses these two services as an example of how the generic security policies supported by the SAC approach can be composed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Intersectoral Collaboration in the Iranian Health System for Implementing Health in all Policies: Challenges and the Way Forward (This Research was Conducted Before the Covoid-19 Pandemic)

Background and Aim: For achievement of equity in the population health the implementation of health in all policies is essential. The most crucial intervention in this approach is inter-sectoral collaboration.  Materials and Methods: This was a qualitative study based on the national policy framework. Data were collected using literature review, in-depth interviews and focus group discussions ...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

The Association between Social Welfare, Food Security and Diet Diversity among Afghan Immigrant Households in the Southern Areas of Tehran Province

Background and Objectives: Due to the importance of ameliorating the food security status of immigrants, as one of the main vulnerable groups at the international level, in the present study, the association between food security, diet diversity, socio-economic factors, and social welfare of Afghan immigrant households in the Southern areas of Tehran Province was investigated.  Materials & Me...

متن کامل

مطالعه رابطه نگرش، ادراک و انگیزش کارکنان با موفقیت سیاست و برنامه‌های خصوصی‌سازی

In the late 1970s, Thatcher's government in UK launched and used the privatization of state-owned enterprises as an instrument to help modernize the unproductive UK economy. Then, growing by an economic tide in 1990s, it was known as a very important tool in the process of economic change of world's different countries from planned and governmental economy toward liberal and market economy. The...

متن کامل

Police Agents for Enforcing Internet Security

Mobile Agents have promised much as an Internet programming technology, but well publicized security problems are hampering their acceptance. This paper argues that mobile agents are a vital component of any Internet security solution. For instance, agents can move computations to safe areas, and can replace out-dated security mechanisms that adapt poorly to the Internet. To underline this argu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000