1 / 8
文档名称:

Elsevier - Computer Communications 23 (2000) 1716–1723 - Security policy conceptual modeling and formalization for networked information systems.pdf

格式:pdf   页数:8
下载后只包含 1 个 PDF 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

Elsevier - Computer Communications 23 (2000) 1716–1723 - Security policy conceptual modeling and formalization for networked information systems.pdf

上传人:bolee65 2014/4/21 文件大小:0 KB

下载得到文件列表

Elsevier - Computer Communications 23 (2000) 1716–1723 - Security policy conceptual modeling and formalization for networked information systems.pdf

文档介绍

文档介绍:munications 23 (2000) 1716–1723
com
Security policy conceptual modeling and formalization
worked information systems
D. Trcˇek*
Institut Jozef Stefan, Dept. of munications works E6, Jamova 39, Ljubljana, Slovenia and College of Management, Cankarjeva 5, Koper,
Slovenia
Abstract
Security worked information systems is a plex task that ranges from the level of crypto-primitives over crypto-protocols to
the level anizational matters and legislation. All this prised in a so-called security policy, which is often treated as an after-
thought. One of the main reasons is the lack of appropriate techniques for conceptual modeling of security policy at early stages of system
design. The approach in this paper is based on flow controls as one of the key ingredients for defining a security policy. Consequent security
services and security architectures are derived by means of the proposed technique, which also bridges the gap to formal techniques. The
result is a formalized output that serves as a basis for further refinement in subsequent stages of the modeling process. ᭧ 2000 Elsevier
Science . All rights reserved.
Keywords: Security architectures; Security policy; Conceptual modeling; Formal methods
1. Introduction needed for addressing security policy at the stage of IS
analysis and design. Besides, being confined to techni-
Providing security in cont