Abstract
This paper is a follow-up on ongoing research in regard of modelling the generation of information security profiles. In previous publications [Pot92, Pot93a, Pot93b] a model named MAPS (Model for Automated Profile Specification) was introduced. This model presents a synthesis for the generation and maintenance of information security profiles which are used in the enforcement of logical access control. The primary assertion made by the MAPS model, is that organizational policies such as the information security policy, job descriptions and business objectives should be used as basis for structuring security requirements. This will ensure conformance of the configured security controls to the high-level as well as more specific policies of an organization. It also provides a basis for the automation and tracking of access control specification.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
M Abrams et al,Generalized Framework for Access Control: Towards Prototyping the Orgcon Policy in Proceedings of the 14th National Computer Security Conference, pp 257–266, October 1–4, 1991.
Computer Associates International Inc, CA-TOP SECRET: The Innovative Security Package for MVS — Product Concepts and Facilities Manual 1991.
Computer Associates International Inc, CA ACF2: The Access Control Facility for MVS — Product Concepts and Facilities Manual 1991.
JE Dobson & JA McDennid, Security Models and Enterprise Models in Database Security II, Status and Prospects, ed CE Landwehr, Elsevier Science Publishers, pp 1–39, 1989.
D Ferraiolo & R Kuhn, Role-Based Access Controls Details of Publication Unknown.
D Ferraiolo & K Ferraiolo, Another Factor in Determining Security Requirements for Trusted Computer Applications in Proceedings of the 14th National Computer Security Conference, pp 37–44, October 1–4, 1991.
IBM World Trade Corporation, Resource Access Control Facility (RACF): General Information Document Nr GC28–0722–15, 16th Edition, April 1992.
D Jonscher & W Gerhardt, A Role-Based Modelling of Access Control with the Help of Frames in Proceedings of the 7th International Conference and Exhibition in Information Security, pp 131–142, 1991.
NJ Nilsson, Principles of Artificial Intelligence Tioga Publishing Company, 1980.
J Pitrat, An Artificial Intelligence Approach to Understanding Natural Language North Oxford Academic Publishers Ltd, 1988.
D Pottas & SH von Solms, MAPS — Model for Automated Profile Specification in Proceedings of the IFIP TC11 8th International Conference on Information Security, pp 131–144, 27–29 May 1992.
D Pottas & SH von Solms, Superseding Manual Generation of Access Control Specification — From Policies to Profiles in Proceedings of the IFIP TC 11 9th International Conference on Information Security, pp 327–342, 12–14 May 1993.
D Pottas & SH von Solms, The Automatic Generation of Information Security Profiles in Proceedings of the CompSec 93 10th World Conference on Computer Security, Audit and Control, 20–22 October 1993.
DF Sterne et al, An Analysis of Application Specific Security Policies in Proceedings of the 14th National Computer Security Conference, pp 25–36, October 1–4, 1991.
J Stoner et al,Management 4th edition, Prentice-Hall, 1989.
SA Wiitala, Discrete Mathematics: A Unified Approach Mc Graw-Hill Book Company, 1987.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Pottas, D., von Solms, S. (1995). Aligning Information Security Profiles With Organizational Policies. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_36
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_36
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive