Distributed systems security
RL Sherman - Computers & Security, 1992 - Elsevier
… Thus it is clearly important to establish a gcncric security policy applicable to the cntirc
conmntnity scrvcd by the whole system. Such a gcncric security policy would scrvc as a tcmplatc or …
conmntnity scrvcd by the whole system. Such a gcncric security policy would scrvc as a tcmplatc or …
Conflicts in policy-based distributed systems management
… Authorization policies are essentially security policies related to accesscontrol and specify
what activities a subject is permitted or forbidden to do to a set of target objects. Obligation …
what activities a subject is permitted or forbidden to do to a set of target objects. Obligation …
[PDF][PDF] Unified support for heterogeneous security policies in distributed systems
NH Minsky, V Ungureanu - 7th USENIX Security Symposium, 1998 - usenix.org
… 3 Security Policies Under Regulated Interaction We start by de ning our concept of a security
policy. We continue by showing how a policy is de ned by what is called a \law", and how it …
policy. We continue by showing how a policy is de ned by what is called a \law", and how it …
Representation and evaluation of security policies for distributed system services
T Ryutov, C Neuman - Proceedings DARPA Information …, 2000 - ieeexplore.ieee.org
… Applications may impose their own security policies and use different authentication ser…
within a distributed system, multiple independent applications coexist. The individual security …
within a distributed system, multiple independent applications coexist. The individual security …
[PDF][PDF] A policy framework for management of distributed systems
NC Damianou - 2002 - Citeseer
… of policy specification for enterprise-wide distributed systems. We propose a policy
specification … We start by providing an overview of security policy models, and follow this with a …
specification … We start by providing an overview of security policy models, and follow this with a …
Hipolds: A hierarchical security policy language for distributed systems
M Dell'Amico, G Serme, MS Idrees… - Information Security …, 2013 - Elsevier
… it difficult for security administrators … Policy Language for Distributed Systems (HiPoLDS),
which has been designed to enable the specification of security policies in distributed systems …
which has been designed to enable the specification of security policies in distributed systems …
Security policies for distributed systems
… security policy. In Section 3, we show that a distributed system complies with its implicit
security policy … to ensure that the global system meets a filtered security policy. Our smart micro …
security policy … to ensure that the global system meets a filtered security policy. Our smart micro …
[PDF][PDF] A language for specifying security and management policies for distributed systems
… control lists for implementing security policy on various security aware platforms, eg operating
systems such as Windows NT and Linux, distributed programming environments such as …
systems such as Windows NT and Linux, distributed programming environments such as …
Embedding security policies into a distributed computing environment
U Halfmann, WE Kühnhauser - ACM SIGOPS Operating Systems Review, 1999 - dl.acm.org
… of security policies in multipolicy systems. Multipolicy systems are systems supporting a
multitude of security … to a computer system results in a distributed system with a multitude of …
multitude of security … to a computer system results in a distributed system with a multitude of …
The role of trust management in distributed systems security
M Blaze, J Feigenbaum, J Ioannidis… - … for mobile and distributed …, 1999 - Springer
… comply with local policies and system architectures that encourage developers and
administrators to consider an application's security policy carefully and specify it explicitly. …
administrators to consider an application's security policy carefully and specify it explicitly. …
Related searches
- security policies distributed computational systems
- policies for distributed systems and networks
- security policies distributed computing environment
- integrity policies distributed systems
- distributed systems management
- security policy language distributed systems
- security policies distributed system services
- security policies system support
- authorization in distributed systems
- corba based distributed systems
- access control in distributed systems
- adaptive security policies
- trust in distributed systems
- open distributed systems
- complex distributed systems
- representation and evaluation distributed system services