The Open UniversitySkip to content

Policy technologies for security management in coalition networks

Calo, Seraphin B.; Karat, Clare-Marie; Karat, John; Lobo, Jorge; Craven, Robert; Lupu, Emil; Ma, Jiefei; Russo, Alessandra; Sloman, Morris and Bandara, Arosha (2010). Policy technologies for security management in coalition networks. In: Verma, Dinesh ed. Network Science for Military Coalition Operations: Information Exchange and Interaction. Premier Reference Source. Pennsylvania, USA: IGI Global, pp. 146–173.

DOI (Digital Object Identifier) Link:
Google Scholar: Look up in Google Scholar


The goal of policy-based security management is to enable military personnel to specify security requirements in terms of simple, intuitive goals. These goals are translated into the concrete system settings in a way that the system behaves in a consistent and desirable way. This technology minimizes the technical expertise required by military personnel and automates security management while allowing a high level control by the human in the loop. This chapter describes a framework for managing security policies, and an overview of two prototypes that simplify different aspects of policy management in the context of coalition operations.

Item Type: Book Section
Copyright Holders: 2010 IGI Global
ISBN: 1-61520-855-0, 978-1-61520-855-5
Extra Information: EISBN13: 9781615208562
Academic Unit/School: Faculty of Science, Technology, Engineering and Mathematics (STEM) > Computing and Communications
Faculty of Science, Technology, Engineering and Mathematics (STEM)
Research Group: Centre for Research in Computing (CRC)
Related URLs:
Item ID: 25196
Depositing User: Arosha Bandara
Date Deposited: 07 Dec 2010 18:01
Last Modified: 07 Dec 2018 09:45
Share this page:


Altmetrics from Altmetric

Citations from Dimensions

Actions (login may be required)

Policies | Disclaimer

© The Open University   contact the OU