Digital government security infrastructure design challenges

被引:47
作者
Joshi, J [1 ]
Ghafoor, A
Aref, WG
Spafford, EH
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Purdue Univ, Ctr Educ & Res Informat Assurance & Secur, W Lafayette, IN 47907 USA
关键词
D O I
10.1109/2.901169
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Designing security systems for a digital government's multidomain environment requires a careful balancing act between providing convenient access and carefully monitoring permissions.
引用
收藏
页码:66 / +
页数:8
相关论文
共 13 条
[1]  
[Anonymous], IEEE T SOFTWARE ENG
[2]  
Bertino E., 1999, ACM Trans. Inf. Syst. Secur., V2, P65, DOI 10.1145/300830.300837
[3]  
HALE J, 1998, P DATABASE SECURITY, V12, P109
[4]  
HE Q, 1998, P 3 AUSTR C INF SEC, P99
[5]  
HOSMER HH, 1992, ACM SIGSAC REV, P18
[6]  
JONSCHER D, 1995, P 9 ANN WORK C DAT S, P43
[7]  
KUHNHAUSER WE, 1995, P 7 CAN COMP SEC S, P1
[8]  
Sandhu R., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P65
[9]  
Sandhu R., 2000, Symposium on Access Control Models and Technologies: Proceedings of the fifth ACM workshop on Role-based access control, V26, P47
[10]  
SCHORR H, 1997, WORKSH RES DEV OPP F