Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which can be unobtrusively mounted on the patient's body in order to monitor and report health-relevant variables to an interconn
Security policy conceptual modeling and formalization for networked information systems
✍ Scribed by D. Trček
- Publisher
- Elsevier Science
- Year
- 2000
- Tongue
- English
- Weight
- 410 KB
- Volume
- 23
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
✦ Synopsis
Security in networked information systems is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an afterthought. One of the main reasons is the lack of appropriate techniques for conceptual modeling of security policy at early stages of system design. The approach in this paper is based on flow controls as one of the key ingredients for defining a security policy. Consequent security services and security architectures are derived by means of the proposed technique, which also bridges the gap to formal techniques. The result is a formalized output that serves as a basis for further refinement in subsequent stages of the modeling process.
📜 SIMILAR VOLUMES