Security in networked information systems is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an afterthought. One of the m
A new model for information security policies
β Scribed by Kenneth R. Lindup
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 498 KB
- Volume
- 14
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
π SIMILAR VOLUMES
In this paper, the need for identifying and analyzing the generic security characteristics of a healthcare information system is, first, demonstrated. The analysis of these characteristics is based upon a decision-support roadmap. The results from this profiling work are then analyzed in the light
How does an organization ensure that all information security loopholes are covered? This paper describes a possible solution in terms of an Information Security Control Attribute Profile for an organization. This profile will dictate attributes that should accompany each and every information secur
within the distributed environment. These access control rules and network protection rules are also held by the accompanying security agent. Protection is therefore transparent to the user, because the agents travel with the access requests and resultant information, and protects it on its path as
## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively βinformation po