|
7th USENIX Security Symposium, 1998   
[Technical Program]
Next: Introduction
A Comparison of Methods for Implementing Adaptive Security Policies
Michael Carney
Abstract:The security policies for computing resources must match the
security policies of the organizations that use them; therefore,
computer security policies must be adaptive to meet the
changing security environment of their user-base. This paper
presents four methods for implementing adaptive security policies
for architectures which separate the definition of the policy in a
Security Server from the enforcement which is done by the kernel.
The four methods discussed include
Brian Loe Tue Dec 9 09:16:53 CST 1997 |
This paper was originally published in the
Proceedings of the 7th USENIX Security Symposium,
January 26-29, 1998,
San Antonio, Texas
Last changed: 12 April 2002 aw |
|