Security level evaluation: policy and fuzzy techniques

In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Casola, V., Rak, M., Preziosi, R., Troiano, L.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 756 Vol.2
container_issue
container_start_page 752
container_title
container_volume 2
creator Casola, V.
Rak, M.
Preziosi, R.
Troiano, L.
description In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.
doi_str_mv 10.1109/ITCC.2004.1286747
format Conference Proceeding
fullrecord <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_pascalfrancis_primary_17458926</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1286747</ieee_id><sourcerecordid>17458926</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-17160237380b5343ec58d7a9e7ddfa77ff115f27b1c8783e000ec381ecdbf89f3</originalsourceid><addsrcrecordid>eNpFkE1LxDAYhAMiqOv-APGSi8fWfDR9E29S_FhY8OB6XtL0DUZitzbtQvfXW6jgXOYwD8MwhNxwlnPOzP1mV1W5YKzIudAlFHBGrhiURgnOtL4g65S-2CxpCqPMJSnf0Y19GCYa8YiR4tHG0Q7h0D7Q7hCDm6htG-rH02miA7rPNvyMmK7Jubcx4frPV-Tj-WlXvWbbt5dN9bjNgmByyDjwkgkJUrNayUKiU7oBaxCaxlsA7zlXXkDNnQYtcR6GTmqOrqm9Nl6uyN3S29nkbPS9bV1I-64P37af9hwKpY0oZ-524QIi_sfLBfIXtmxRPg</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security level evaluation: policy and fuzzy techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</creator><creatorcontrib>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</creatorcontrib><description>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</description><identifier>ISBN: 0769521088</identifier><identifier>ISBN: 9780769521084</identifier><identifier>DOI: 10.1109/ITCC.2004.1286747</identifier><language>eng</language><publisher>Las Alamitos CA: IEEE</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Data engineering ; Data security ; Digital signatures ; Exact sciences and technology ; Information security ; Interconnected systems ; Law ; Legal factors ; Public key ; Standards organizations ; Uncertainty</subject><ispartof>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, 2004, Vol.2, p.752-756 Vol.2</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1286747$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1286747$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=17458926$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Casola, V.</creatorcontrib><creatorcontrib>Rak, M.</creatorcontrib><creatorcontrib>Preziosi, R.</creatorcontrib><creatorcontrib>Troiano, L.</creatorcontrib><title>Security level evaluation: policy and fuzzy techniques</title><title>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004</title><addtitle>ITCC</addtitle><description>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Data engineering</subject><subject>Data security</subject><subject>Digital signatures</subject><subject>Exact sciences and technology</subject><subject>Information security</subject><subject>Interconnected systems</subject><subject>Law</subject><subject>Legal factors</subject><subject>Public key</subject><subject>Standards organizations</subject><subject>Uncertainty</subject><isbn>0769521088</isbn><isbn>9780769521084</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkE1LxDAYhAMiqOv-APGSi8fWfDR9E29S_FhY8OB6XtL0DUZitzbtQvfXW6jgXOYwD8MwhNxwlnPOzP1mV1W5YKzIudAlFHBGrhiURgnOtL4g65S-2CxpCqPMJSnf0Y19GCYa8YiR4tHG0Q7h0D7Q7hCDm6htG-rH02miA7rPNvyMmK7Jubcx4frPV-Tj-WlXvWbbt5dN9bjNgmByyDjwkgkJUrNayUKiU7oBaxCaxlsA7zlXXkDNnQYtcR6GTmqOrqm9Nl6uyN3S29nkbPS9bV1I-64P37af9hwKpY0oZ-524QIi_sfLBfIXtmxRPg</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Casola, V.</creator><creator>Rak, M.</creator><creator>Preziosi, R.</creator><creator>Troiano, L.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Security level evaluation: policy and fuzzy techniques</title><author>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-17160237380b5343ec58d7a9e7ddfa77ff115f27b1c8783e000ec381ecdbf89f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Data engineering</topic><topic>Data security</topic><topic>Digital signatures</topic><topic>Exact sciences and technology</topic><topic>Information security</topic><topic>Interconnected systems</topic><topic>Law</topic><topic>Legal factors</topic><topic>Public key</topic><topic>Standards organizations</topic><topic>Uncertainty</topic><toplevel>online_resources</toplevel><creatorcontrib>Casola, V.</creatorcontrib><creatorcontrib>Rak, M.</creatorcontrib><creatorcontrib>Preziosi, R.</creatorcontrib><creatorcontrib>Troiano, L.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Casola, V.</au><au>Rak, M.</au><au>Preziosi, R.</au><au>Troiano, L.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security level evaluation: policy and fuzzy techniques</atitle><btitle>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004</btitle><stitle>ITCC</stitle><date>2004</date><risdate>2004</risdate><volume>2</volume><spage>752</spage><epage>756 Vol.2</epage><pages>752-756 Vol.2</pages><isbn>0769521088</isbn><isbn>9780769521084</isbn><abstract>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</abstract><cop>Las Alamitos CA</cop><pub>IEEE</pub><doi>10.1109/ITCC.2004.1286747</doi></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 0769521088
ispartof International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, 2004, Vol.2, p.752-756 Vol.2
issn
language eng
recordid cdi_pascalfrancis_primary_17458926
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Applied sciences
Computer science
control theory
systems
Data engineering
Data security
Digital signatures
Exact sciences and technology
Information security
Interconnected systems
Law
Legal factors
Public key
Standards organizations
Uncertainty
title Security level evaluation: policy and fuzzy techniques
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T19%3A22%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20level%20evaluation:%20policy%20and%20fuzzy%20techniques&rft.btitle=International%20Conference%20on%20Information%20Technology:%20Coding%20and%20Computing,%202004.%20Proceedings.%20ITCC%202004&rft.au=Casola,%20V.&rft.date=2004&rft.volume=2&rft.spage=752&rft.epage=756%20Vol.2&rft.pages=752-756%20Vol.2&rft.isbn=0769521088&rft.isbn_list=9780769521084&rft_id=info:doi/10.1109/ITCC.2004.1286747&rft_dat=%3Cpascalfrancis_6IE%3E17458926%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1286747&rfr_iscdi=true