Security Policy Enforcement

Loading...
Thumbnail Image
Authors
Irvine, Cynthia E.
Subjects
Advisors
Date of Issue
2005-03
Date
Publisher
Wiley
Language
Abstract
Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enforcement mechanisms in computer systems. It is intended to focus primarily on fundamental concepts, which remain valid despite their longevity.
Type
Book Chapter
Description
Series/Report No
Department
Computer Science (CS)
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Handbook of Information Security, ed. H. Bidgoli, John Wiley and Sons, Hoboken, NJ, pp. 1026-1040 (PDF)
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections