Policy-based security management for enterprise systems

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

With the increasing growth in global enterprises and collaborations among the enterprises, security and trust have become essential for information systems. For example, within an enterprise, there may be a need to maintain security within each project group so the information sharing among the groups is controlled. Similarly, there may be a need to facilitate controlled and timed sharing of data among cooperating enterprises (e.g., coalitions). In this paper, we propose a policy-based security mechanism for such sharing in an enterprise. In particular, in our system, each user (or administrator) specifies restrictions on the use of resources at a particular node (or machine) in terms of a set of policy statements (NRPS and NTPS). Similarly, the owner of each object specifies the conditions on which certain operations can be performed on the object (ORPS and OTPS). Trusted policy enforcement agents (PEA), running at each node in the enterprise (or coalition), ensure that both node and object policies are enforced in the system. We show how the proposed system facilitates dynamic control at object-level and machine-level. © 2004 Springer Science + Business Media, Inc.

Cite

CITATION STYLE

APA

Mukkamala, R., Chekuri, L., Moharrum, M., & Palley, S. (2004). Policy-based security management for enterprise systems. In IFIP Advances in Information and Communication Technology (Vol. 144, pp. 219–234). Springer New York LLC. https://doi.org/10.1007/1-4020-8128-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free