Skip to main content

Application-Oriented Security Policies and Their Composition

Transcript of Discussion

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1550))

Abstract

Basically I seem to come back to this notion of policies once every five years when I remind myself of the logically difficult problem, namely that of determining the role of security administrators, if any, in systems in general. So the question is, can we shoot this guy and work happily everafter, and the answer is generally, I believe although I’m not quite sure, is that it is no. We basically have to have a certain degree of trust in the ability, intentions and motivations of security administrators. The second conclusion, which I think again is a partial conclusion, is that security administrators are really part of policies so in some sense we are examining the question about what should these good guys do as opposed to what the bad guys do. In other words, suppose that we solved the problem of the bad guys, there are no more bad guys in the world, no men in the middle attack, everything is fine, do we get security problems, and the answer is sure, human failures, bad intentions of this dependent component called a security administrator.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gligor, V. (1998). Application-Oriented Security Policies and Their Composition. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds) Security Protocols. Security Protocols 1998. Lecture Notes in Computer Science, vol 1550. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49135-X_12

Download citation

  • DOI: https://doi.org/10.1007/3-540-49135-X_12

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65663-0

  • Online ISBN: 978-3-540-49135-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics