Contemporary group communication systems address the security requirements envisioned by software developers. However, the ability of these systems to address unanticipated requirements arising from their introduction into new environments is limited. This thesis addresses these limitations through the realization of an infrastructure supporting policy determination and enforcement in multiparty communication. The traditional definition of policy is extended to encompass provisioning, authentication, and access control. Hence, all aspects of communication security are explicitly stated through policy. A policy instantiation is constructed at run-time through policy determination. The Ismene policy determination engine reconciles the cond...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforce...
Security management involves specification and deployment of access control policies as well as acti...
The goal of policy-based security management is to enable military personnel to specify security req...
Contemporary group communication systems address the security requirements envisioned by software de...
Significant strides have been made in achieving strong semantics and security guarantees within grou...
Many emerging applications on the Internet requiring group communication have varying securi-ty requ...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Modern computing environments involve a multitude of components working in concert to provide servic...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In large organisations, many branches and departments have their own unique information security req...
this paper we present our design for a group communication system intended for the implementation of...
The evolution of technological progress continually presents new information security challenges for...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforce...
Security management involves specification and deployment of access control policies as well as acti...
The goal of policy-based security management is to enable military personnel to specify security req...
Contemporary group communication systems address the security requirements envisioned by software de...
Significant strides have been made in achieving strong semantics and security guarantees within grou...
Many emerging applications on the Internet requiring group communication have varying securi-ty requ...
Security in computer systems is concerned with protecting resources from unauthorized access while e...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Modern computing environments involve a multitude of components working in concert to provide servic...
Collaborative work needs a flexible secured networking management tool, as virtual teams can be form...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
In large organisations, many branches and departments have their own unique information security req...
this paper we present our design for a group communication system intended for the implementation of...
The evolution of technological progress continually presents new information security challenges for...
Most organizations use several security policies to con-trol different systems and data, comprising ...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforce...
Security management involves specification and deployment of access control policies as well as acti...
The goal of policy-based security management is to enable military personnel to specify security req...