Title :
Security policy management for networked information systems
Author_Institution :
Jozef Stefan Inst., Ljubljana Univ., Slovenia
Abstract :
Successful management of networked information systems is largely dependent on security. However, security is a very complex task that ranges from the level of crypto-primitives over crypto-protocols to the level of organizational matters and legislation. All this is comprised in a so-called security policy, which is often treated as an afterthought. One of the main reasons is the lack of appropriate techniques for conceptual modeling of security policy at early stages of system design. The approach in this paper gives an appropriate solution that also bridges the gap to formal techniques. It results in a formalized output that serves as a basis for further refinement in subsequent stages of the modeling process.
Keywords :
"Information security","Information management","Management information systems","Cryptography","Protection","System analysis and design","Data security","Legislation","Bridges","Computer network management"
Conference_Titel :
Network Operations and Management Symposium, 2000. NOMS 2000. 2000 IEEE/IFIP
Print_ISBN :
0-7803-5928-3
DOI :
10.1109/NOMS.2000.830431