Security Policy Enforcement
Irvine, Cynthia E.
MetadataShow full item record
Many chapters of this Handbook describe mechanisms that contribute to various facets of security. The arbitrary use of security mechanisms provides no prescription for the achievement of security goals. It is only in their application in the context of organizational objectives for the protection of information and computational assets that security can be assessed. This chapter is intended to discuss the policies that provide a rationale for those mechanisms and to broadly examine their enforcement mechanisms in computer systems. It is intended to focus primarily on fundamental concepts, which remain valid despite their longevity.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Hartmann, Allison M. (Monterey, California. Naval Postgraduate School, 2001-09);This thesis examines the political and security impacts of the devolution of power to Russia's regions since 1993. By reviewing the basis of Russia's federal structure the author identifies how the nature of the structure ...
Hartmann, Allison M. (2001-09);This thesis examines the political and security impacts of the devolution of power to Russiagass regions since 1993. By reviewing the basis of Russiagass federal structure the author identifies how the nature of the structure ...
Irvine, Cynthia E.; Levin, Timothy. E.; Nguyen, Thuy D.; Shifflett, David J.; Khosalim, Jean; Clark, Paul C.; Wong, Albert; Afinidad, Francis; Bibighaus, David; Sears, Joseph (IEEE, 2004-06-00);A high assurance architecture is described for the protection of distributed multilevel secure computing environments from malicious code and other attacks. Component security services and mechanisms extend and inter-operate ...