메뉴 건너뛰기




Volumn 19, Issue 3, 2000, Pages 267-281

Achieving interoperability in a multiple-security-policies environment

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS PROGRAMMING; INTEROPERABILITY; PUBLIC POLICY;

EID: 0034159709     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0167-4048(00)88615-0     Document Type: Article
Times cited : (16)

References (30)
  • 1
    • 0030408473 scopus 로고    scopus 로고
    • Security issues in the Virtual Corporation
    • R. Frank, Security issues in the Virtual Corporation, Computers and Security, 15(6), (1996), 471-476.
    • (1996) Computers and Security , vol.15 , Issue.6 , pp. 471-476
    • Frank, R.1
  • 7
    • 0030384205 scopus 로고    scopus 로고
    • The Role of Information Security in Corporate Governance
    • K. Lindup, The Role of Information Security in Corporate Governance, Computers and Security, 15(6), (1996), 477-485.
    • (1996) Computers and Security , vol.15 , Issue.6 , pp. 477-485
    • Lindup, K.1
  • 8
    • 21344459955 scopus 로고    scopus 로고
    • Structures of responsibility and security of information systems
    • J. Backhouse and G. Dhillon, Structures of responsibility and security of information systems, European Journal of Information Systems, 5(1), (1996), 2-9.
    • (1996) European Journal of Information Systems , vol.5 , Issue.1 , pp. 2-9
    • Backhouse, J.1    Dhillon, G.2
  • 9
    • 0008469667 scopus 로고
    • Creating confidence through consensus: Using the security by consensus model as a framework for security in open information systems
    • in D.T. Lindsay and W.L. Price, (eds) Elsevier Science Publ
    • S. Kowalski, Creating confidence through consensus: Using the security by consensus model as a framework for security in open information systems, in D.T. Lindsay and W.L. Price, (eds), Information Security, IFIP/SEC '91, pp. 259-269, Elsevier Science Publ., 1991.
    • (1991) Information Security, IFIP/SEC '91 , pp. 259-269
    • Kowalski, S.1
  • 10
    • 34447127989 scopus 로고
    • The multipolicy paradigm for trusted systems, in
    • Sept. Rhode Island, U.S.A., IEEE Press
    • H. Hosmer, The multipolicy paradigm for trusted systems, in Proc. of the 1992 New Security Paradigms Workshop, Sept. 1992, Rhode Island, U.S.A., IEEE Press.
    • (1992) Proc. of the 1992 New Security Paradigms Workshop
    • Hosmer, H.1
  • 11
    • 0029545652 scopus 로고
    • A new model for information security policies
    • K. Lindup, A new model for information security policies, Computers and Security, 14(6), (1995), 691-695.
    • (1995) Computers and Security , vol.14 , Issue.6 , pp. 691-695
    • Lindup, K.1
  • 12
    • 0000613590 scopus 로고
    • Writing InfoSec Policies
    • C. Cresson Wood, Writing InfoSec Policies, Computers and Security, 14(6), (1995), 667-674.
    • (1995) Computers and Security , vol.14 , Issue.6 , pp. 667-674
    • Cresson Wood, C.1
  • 19
    • 84976813912 scopus 로고
    • On the semantic equivalence of heterogeneous populations in multimodel, multidatabase systems
    • D. Gangopadhyay and T. Barsalou, On the semantic equivalence of heterogeneous populations in multimodel, multidatabase systems, SIGMOD Record 20(4), 1991.
    • (1991) SIGMOD Record , vol.20 , Issue.4
    • Gangopadhyay, D.1    Barsalou, T.2
  • 21
    • 0025489261 scopus 로고
    • Federated database systems for managing distributed, heterogeneous and autonomous databases
    • A. Sheth and J. Larson, Federated database systems for managing distributed, heterogeneous and autonomous databases, ACM Computing Surveys, 22(3), 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.3
    • Sheth, A.1    Larson, J.2
  • 23
    • 0028445789 scopus 로고
    • Automated resolution of semantic heterogeneity in multidatabases
    • M. Bright, A. Hurson and S. Pakzard, Automated resolution of semantic heterogeneity in multidatabases, ACM Transactions on Database Systems, 19(2), (1994), 212-253.
    • (1994) ACM Transactions on Database Systems , vol.19 , Issue.2 , pp. 212-253
    • Bright, M.1    Hurson, A.2    Pakzard, S.3
  • 24
    • 0008487894 scopus 로고
    • Commission of European Communities
    • Commission of EU, DGXIII, contract S2001, Brussels, Luxembourg
    • Commission of European Communities, Glossary of Information Systems Security, Commission of EU, DGXIII, contract S2001, Brussels, Luxembourg, 1993.
    • (1993) Glossary of Information Systems Security
  • 28
    • 0031628589 scopus 로고    scopus 로고
    • Recent security surveys
    • S. Hinde, Recent security surveys, Computers and Security, 17, (1998), 207-210.
    • (1998) Computers and Security , vol.17 , pp. 207-210
    • Hinde, S.1
  • 30
    • 0008447836 scopus 로고    scopus 로고
    • The application of profile security model for downloaded executable content
    • in G. Papp and R. Posch (eds) Austrian Computer Society, Vienna Evangelos Kiountouzis is a professor of Systems Analysis at the Department of Informatics at the Athens University of Economics and Business. He received a B.Sc. degree in Mathematics from the University of Athens and a Ph.D. degree in Systems Analysis from the University of Ulster (U.K.). He has taught at University of Athens (Greece), at University of Ulster (U.K.) and University of Ioannina (Greece). His current research interests include the development of Information Systems Security models and the use of multimethodology to develop Information Systems. Evangelos Kiountouzis has published numerous books and research articles on a wide range of topics. He has also been involved in numerous projects developing information systems
    • P. Trommler, The application of profile security model for downloaded executable content, in G. Papp and R. Posch (eds), Global IT security: proceedings of the IFIP/SEC '98, Austrian Computer Society, Vienna, 1998.
    • (1998) Global IT Security: Proceedings of the IFIP/SEC '98
    • Trommler, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.