The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Policy Technologies for Security Management in Coalition Networks
|
Author(s): Seraphin B. Calo (IBM Research, USA), Clare-Marie Karat (IBM Research, USA), John Karat (IBM Research, USA), Jorge Lobo (IBM Research, USA), Robert Craven (Imperial College, UK), Emil Lupu (Imperial College, UK), Jiefei Ma (Imperial College, UK), Alessandra Russo (Imperial College, UK), Morris Sloman (Imperial College, UK)and Arosha Bandara (The Open University, UK)
Copyright: 2011
Pages: 27
Source title:
Global Business: Concepts, Methodologies, Tools and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-60960-587-2.ch316
Purchase
|
Abstract
The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.
Related Content
Piotr Pietrzak.
© 2026.
32 pages.
|
Georgios Koukakis.
© 2026.
30 pages.
|
Yunus Emre Ozigci.
© 2026.
46 pages.
|
Zafar Mahfooz Nomani, Saddam Husain.
© 2026.
36 pages.
|
Muhammad Arif Khan.
© 2026.
18 pages.
|
Aditya Agrawal, Yashfeen Ali, Abhijit Mishra, Roshni Parveen.
© 2026.
28 pages.
|
Aayushi Goel, Akash Bag, Vineet Mishra, Nupur Kumari.
© 2026.
40 pages.
|
|
|