Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Jonathan D. Moffett"'
Publikováno v:
Journal of Network and Systems Management. 11:373-376
Policy-based systems are the subject of a wide range of activities in universities, standardization bodies and within industry [1]. They have a wide spectrum of applications ranging from quality-of-service management within networks to security and e
Autor:
Jonathan D. Moffett, Andrew Vickers
Publikováno v:
Automated Software Engineering. 7:215-238
Inconsistencies may arise in the course of specification of systems, and it is now recognised that they cannot be forbidden. Recent work has concentrated on enabling requirements descriptions to tolerate inconsistency and on proposing notations that
Publikováno v:
Requirements Engineering. 1:27-46
The language of causation is natural for the specification of requirements for complex systems. The paper provides a vocabulary of causal specification expressions, suitable for describing and analysing such systems. The notation is given a syntax an
Publikováno v:
Computers & Security. 14:147-157
This paper views the Reference Monitor in a new framework that makes it possible to generalize from passive to active monitors. It describes a major trend in the evolution of information systems security. The concepts are a practical reflection of re
Publikováno v:
Computer Networks and ISDN Systems. 26:263-267
Secure electronic mail (PEM) and remote access services, using asymmetric key cryptology have been developed and proved between several European countries. The paper reviews the project, high-lighting its shortcomings, since they are most likely to b
Autor:
Morris Sloman, Jonathan D. Moffett
Publikováno v:
COOCS
This is an exploratory paper in which we describe aspects of management policy which could be modelled as objects in a distributed computer system, in order to enable them to be queried and manipulated. Policies are 'the plans of an organisation to m
Autor:
Jonathan D. Moffett, Morris Sloman
Publikováno v:
ACM SIGOPS Operating Systems Review. 25:63-70
Content-dependent access control, where the access decisions depend upon the value of an attribute of the object itself, is required in many applications. However problems arise in an object-based environment, because obtaining the value of an object
Publikováno v:
Computer Communications. 13:571-580
This paper discusses a proposed framework for specifying access control policy for very large distributed processing systems. These typically consist of multiple interconnected networks and span the computer systems belonging to different organizatio
When considering the security of a system, the analyst must simultaneously work with two types of properties: those that can be shown to be true, and those that must be argued as being true. The first consists of properties that can be demonstrated c
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19763d32cedabb0c859407167c0fa723
http://oro.open.ac.uk/2493/1/ISSE-Haley-Final.pdf
http://oro.open.ac.uk/2493/1/ISSE-Haley-Final.pdf
Publikováno v:
SESS@ICSE
Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06)
Software Engineering for Secure Systems Workshop (SESS'06), co-located with the 28th International Conference on Software Engineering (ICSE'06)
This paper presents a framework for security requirements\ud elicitation and analysis, based upon the construction of a context for the system and satisfaction arguments for the security of the system. One starts with enumeration of security goals ba