𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A new model for information security policies

✍ Scribed by Kenneth R. Lindup


Publisher
Elsevier Science
Year
1995
Tongue
English
Weight
498 KB
Volume
14
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Security policy conceptual modeling and
✍ D. Trček πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 410 KB

Security in networked information systems is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an afterthought. One of the m

A baseline security policy for distribut
✍ Dimitris Gritzalis πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 995 KB

In this paper, the need for identifying and analyzing the generic security characteristics of a healthcare information system is, first, demonstrated. The analysis of these characteristics is based upon a decision-support roadmap. The results from this profiling work are then analyzed in the light

A model for deriving information securit
✍ Helen van der Haar; Rossouw von Solms πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 607 KB

How does an organization ensure that all information security loopholes are covered? This paper describes a possible solution in terms of an Information Security Control Attribute Profile for an organization. This profile will dictate attributes that should accompany each and every information secur

New organizational forms for information
πŸ“‚ Article πŸ“… 1997 πŸ› Elsevier Science 🌐 English βš– 112 KB

within the distributed environment. These access control rules and network protection rules are also held by the accompanying security agent. Protection is therefore transparent to the user, because the agents travel with the access requests and resultant information, and protects it on its path as

Homeland security and information contro
✍ Terrence A. Maxwell πŸ“‚ Article πŸ“… 2005 πŸ› Wiley (John Wiley & Sons) 🌐 English βš– 739 KB

## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively β€˜information po