Calo, Seraphin B.; Karat, Clare-Marie; Karat, John; Lobo, Jorge; Craven, Robert; Lupu, Emil ; Ma, Jiefei; Russo, Alessandra; Sloman, Morris and Bandara, Arosha
(2010). Policy technologies for security management in coalition networks.
In: Verma, Dinesh ed.
Network Science for Military Coalition Operations: Information Exchange and Interaction.
Premier Reference Source.
Pennsylvania, USA: IGI Global, pp. 146–173.
(Click here to request a copy from the OU Author.
The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.
Actions (login may be required)