Access the full text.
Sign up today, get DeepDyve free for 14 days.
J. Dobson, J. Mcdermid (1989)
A framework for expressing models of security policyProceedings. 1989 IEEE Symposium on Security and Privacy
(1991)
ASAC Data Management Security and Privacy Workshop
(1988)
Implementing the Clark-Wilson Integrity Policy Using Current Technology
D. Sterne (1991)
On the buzzword 'security policy'Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy
The list below is not intended to be comprehensive, but merely illustrative of the range and depth of multipolicy-related research underway today
(1990)
Trusted Software Development Methodology Report, Strategic Defense Initiative Office (SDIO), 2 July
(1991)
Amdahl Approach to Security Labels
(1991)
The Multipolicy Machine
(1991)
An Analysis of Application Specific Security Policies
Informal Communications, Intemet "Policy Nuance Forum
(1991)
Metapolicies
(1991)
Generalized Framework for Access Control: Towards Prototyping the ORGCON Policy
(1988)
Implementing the Clark-Wilson Integrity Policy Using Current Technology", 1 lth
D. Estrin, G. Tsudik (1989)
Security issues in policy routingProceedings. 1989 IEEE Symposium on Security and Privacy
(1990)
Introduction to the Gemini Trusted Network Processor
(1989)
Evaluation of Security Model Rule Bases
(1988)
BiiN 60 System Technical Overview
(1989)
A 'New' Security Model
Most information systems which we try to model from a security perspective are implicitly governed by multiple security policies, hereafter called multipolicies. This stems from the fact that these systems generally support people-oriented activities which have different security relevant characteristics and are regulated by varying rules depending upon the roles and functions of individuals as well as the contexts of tasks performed by them. Such systems are evident in a variety of commercial and government enterprises. Examples of multipolicy environments include trusted software programming support environments, banking systems, interservice military programs such as SDI, international military organizations such as NATO, medical information systems, and multinational corporations to mention a few.
ACM SIGSAC Review – Association for Computing Machinery
Published: Jun 30, 1992
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.