Distributed systems security

RL Sherman - Computers & Security, 1992 - Elsevier
… Thus it is clearly important to establish a gcncric security policy applicable to the cntirc
conmntnity scrvcd by the whole system. Such a gcncric security policy would scrvc as a tcmplatc or …

Conflicts in policy-based distributed systems management

EC Lupu, M Sloman - IEEE Transactions on software …, 1999 - ieeexplore.ieee.org
… Authorization policies are essentially security policies related to accesscontrol and specify
what activities a subject is permitted or forbidden to do to a set of target objects. Obligation …

[PDF][PDF] Unified support for heterogeneous security policies in distributed systems

NH Minsky, V Ungureanu - 7th USENIX Security Symposium, 1998 - usenix.org
… 3 Security Policies Under Regulated Interaction We start by de ning our concept of a security
policy. We continue by showing how a policy is de ned by what is called a \law", and how it …

Representation and evaluation of security policies for distributed system services

T Ryutov, C Neuman - Proceedings DARPA Information …, 2000 - ieeexplore.ieee.org
… Applications may impose their own security policies and use different authentication ser…
within a distributed system, multiple independent applications coexist. The individual security

[PDF][PDF] A policy framework for management of distributed systems

NC Damianou - 2002 - Citeseer
… of policy specification for enterprise-wide distributed systems. We propose a policy
specification … We start by providing an overview of security policy models, and follow this with a …

Hipolds: A hierarchical security policy language for distributed systems

M Dell'Amico, G Serme, MS Idrees… - Information Security …, 2013 - Elsevier
… it difficult for security administrators … Policy Language for Distributed Systems (HiPoLDS),
which has been designed to enable the specification of security policies in distributed systems

Security policies for distributed systems

J Quilbeuf, G Igna, D Bytschkow, H Ruess - arXiv preprint arXiv:1310.3723, 2013 - arxiv.org
security policy. In Section 3, we show that a distributed system complies with its implicit
security policy … to ensure that the global system meets a filtered security policy. Our smart micro …

[PDF][PDF] A language for specifying security and management policies for distributed systems

N Damianou, N Dulay, E Lupu, M Sloman - London: Department of …, 2000 - Citeseer
… control lists for implementing security policy on various security aware platforms, eg operating
systems such as Windows NT and Linux, distributed programming environments such as …

Embedding security policies into a distributed computing environment

U Halfmann, WE Kühnhauser - ACM SIGOPS Operating Systems Review, 1999 - dl.acm.org
… of security policies in multipolicy systems. Multipolicy systems are systems supporting a
multitude of security … to a computer system results in a distributed system with a multitude of …

The role of trust management in distributed systems security

M Blaze, J Feigenbaum, J Ioannidis… - … for mobile and distributed …, 1999 - Springer
… comply with local policies and system architectures that encourage developers and
administrators to consider an application's security policy carefully and specify it explicitly. …