Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

A look at multipolicy research today and some proposed directions for tomorrow: a panel paper for the ACM SIGSAC workshop on data management security and privacy standards, San Antonio, TX, December 3, 1991

A look at multipolicy research today and some proposed directions for tomorrow: a panel paper for... Most information systems which we try to model from a security perspective are implicitly governed by multiple security policies, hereafter called multipolicies. This stems from the fact that these systems generally support people-oriented activities which have different security relevant characteristics and are regulated by varying rules depending upon the roles and functions of individuals as well as the contexts of tasks performed by them. Such systems are evident in a variety of commercial and government enterprises. Examples of multipolicy environments include trusted software programming support environments, banking systems, interservice military programs such as SDI, international military organizations such as NATO, medical information systems, and multinational corporations to mention a few. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png ACM SIGSAC Review Association for Computing Machinery

A look at multipolicy research today and some proposed directions for tomorrow: a panel paper for the ACM SIGSAC workshop on data management security and privacy standards, San Antonio, TX, December 3, 1991

ACM SIGSAC Review , Volume 10 (2-3) – Jun 30, 1992

Loading next page...
 
/lp/association-for-computing-machinery/a-look-at-multipolicy-research-today-and-some-proposed-directions-for-TtI0DvHexH

References (18)

Publisher
Association for Computing Machinery
Copyright
Copyright © 1992 by ACM Inc.
ISSN
0277-920X
DOI
10.1145/147092.147095
Publisher site
See Article on Publisher Site

Abstract

Most information systems which we try to model from a security perspective are implicitly governed by multiple security policies, hereafter called multipolicies. This stems from the fact that these systems generally support people-oriented activities which have different security relevant characteristics and are regulated by varying rules depending upon the roles and functions of individuals as well as the contexts of tasks performed by them. Such systems are evident in a variety of commercial and government enterprises. Examples of multipolicy environments include trusted software programming support environments, banking systems, interservice military programs such as SDI, international military organizations such as NATO, medical information systems, and multinational corporations to mention a few.

Journal

ACM SIGSAC ReviewAssociation for Computing Machinery

Published: Jun 30, 1992

There are no references for this article.