Building a secure computer system
Building a secure computer system
A framework for information security evaluation
Information and Management
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Computer System and Network Security
Computer System and Network Security
Using contextual security policies for threat response
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
In defense of the realm: understanding the threats to information security
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
It is difficult to define reliable security policy components that should be applied to validate a secure computing environment. The job gets further complicated when one has to deal with multiple policies in single computing environment. This paper demonstrates how we can overcome the difficulties of defining reliable security components by using evaluation criteria. In this paper we use common criteria to derive the security functional components for a multipolicy-based network computing environment. In the verification process, the derived policy components are related to the specific security objectives of the network communication environment. The evidence listed in the case study supports the claims that the proposed network security policy interpretation framework is a complete and cohesive set of requirements.