Security level evaluation: policy and fuzzy techniques
In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referr...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 756 Vol.2 |
---|---|
container_issue | |
container_start_page | 752 |
container_title | |
container_volume | 2 |
creator | Casola, V. Rak, M. Preziosi, R. Troiano, L. |
description | In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels. |
doi_str_mv | 10.1109/ITCC.2004.1286747 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_6IE</sourceid><recordid>TN_cdi_pascalfrancis_primary_17458926</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1286747</ieee_id><sourcerecordid>17458926</sourcerecordid><originalsourceid>FETCH-LOGICAL-i203t-17160237380b5343ec58d7a9e7ddfa77ff115f27b1c8783e000ec381ecdbf89f3</originalsourceid><addsrcrecordid>eNpFkE1LxDAYhAMiqOv-APGSi8fWfDR9E29S_FhY8OB6XtL0DUZitzbtQvfXW6jgXOYwD8MwhNxwlnPOzP1mV1W5YKzIudAlFHBGrhiURgnOtL4g65S-2CxpCqPMJSnf0Y19GCYa8YiR4tHG0Q7h0D7Q7hCDm6htG-rH02miA7rPNvyMmK7Jubcx4frPV-Tj-WlXvWbbt5dN9bjNgmByyDjwkgkJUrNayUKiU7oBaxCaxlsA7zlXXkDNnQYtcR6GTmqOrqm9Nl6uyN3S29nkbPS9bV1I-64P37af9hwKpY0oZ-524QIi_sfLBfIXtmxRPg</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security level evaluation: policy and fuzzy techniques</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</creator><creatorcontrib>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</creatorcontrib><description>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</description><identifier>ISBN: 0769521088</identifier><identifier>ISBN: 9780769521084</identifier><identifier>DOI: 10.1109/ITCC.2004.1286747</identifier><language>eng</language><publisher>Las Alamitos CA: IEEE</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Data engineering ; Data security ; Digital signatures ; Exact sciences and technology ; Information security ; Interconnected systems ; Law ; Legal factors ; Public key ; Standards organizations ; Uncertainty</subject><ispartof>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, 2004, Vol.2, p.752-756 Vol.2</ispartof><rights>2006 INIST-CNRS</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1286747$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,4050,4051,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1286747$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=17458926$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Casola, V.</creatorcontrib><creatorcontrib>Rak, M.</creatorcontrib><creatorcontrib>Preziosi, R.</creatorcontrib><creatorcontrib>Troiano, L.</creatorcontrib><title>Security level evaluation: policy and fuzzy techniques</title><title>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004</title><addtitle>ITCC</addtitle><description>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Data engineering</subject><subject>Data security</subject><subject>Digital signatures</subject><subject>Exact sciences and technology</subject><subject>Information security</subject><subject>Interconnected systems</subject><subject>Law</subject><subject>Legal factors</subject><subject>Public key</subject><subject>Standards organizations</subject><subject>Uncertainty</subject><isbn>0769521088</isbn><isbn>9780769521084</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2004</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkE1LxDAYhAMiqOv-APGSi8fWfDR9E29S_FhY8OB6XtL0DUZitzbtQvfXW6jgXOYwD8MwhNxwlnPOzP1mV1W5YKzIudAlFHBGrhiURgnOtL4g65S-2CxpCqPMJSnf0Y19GCYa8YiR4tHG0Q7h0D7Q7hCDm6htG-rH02miA7rPNvyMmK7Jubcx4frPV-Tj-WlXvWbbt5dN9bjNgmByyDjwkgkJUrNayUKiU7oBaxCaxlsA7zlXXkDNnQYtcR6GTmqOrqm9Nl6uyN3S29nkbPS9bV1I-64P37af9hwKpY0oZ-524QIi_sfLBfIXtmxRPg</recordid><startdate>2004</startdate><enddate>2004</enddate><creator>Casola, V.</creator><creator>Rak, M.</creator><creator>Preziosi, R.</creator><creator>Troiano, L.</creator><general>IEEE</general><general>IEEE Computer Society</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>IQODW</scope></search><sort><creationdate>2004</creationdate><title>Security level evaluation: policy and fuzzy techniques</title><author>Casola, V. ; Rak, M. ; Preziosi, R. ; Troiano, L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i203t-17160237380b5343ec58d7a9e7ddfa77ff115f27b1c8783e000ec381ecdbf89f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2004</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Data engineering</topic><topic>Data security</topic><topic>Digital signatures</topic><topic>Exact sciences and technology</topic><topic>Information security</topic><topic>Interconnected systems</topic><topic>Law</topic><topic>Legal factors</topic><topic>Public key</topic><topic>Standards organizations</topic><topic>Uncertainty</topic><toplevel>online_resources</toplevel><creatorcontrib>Casola, V.</creatorcontrib><creatorcontrib>Rak, M.</creatorcontrib><creatorcontrib>Preziosi, R.</creatorcontrib><creatorcontrib>Troiano, L.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Casola, V.</au><au>Rak, M.</au><au>Preziosi, R.</au><au>Troiano, L.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security level evaluation: policy and fuzzy techniques</atitle><btitle>International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004</btitle><stitle>ITCC</stitle><date>2004</date><risdate>2004</risdate><volume>2</volume><spage>752</spage><epage>756 Vol.2</epage><pages>752-756 Vol.2</pages><isbn>0769521088</isbn><isbn>9780769521084</isbn><abstract>In a world made of interconnected systems that manage huge amount of confidential and shared data, security plays a significant role. Policies are the means by which security rules are defined and enforced. The ability of evaluating policies is becoming more and more relevant, especially when referred to cooperation of services belonging to untrusted domains. Here we have focused our attention on public key infrastructures (PKIs); at the state of the art security policies evaluation is expressed by means of security levels. However, policy evaluation must face uncertainty deriving from different perspectives, verbal judgments and lack of information. Fuzzy techniques and uncertainty reasoning can provide a meaningful way of dealing with these issues. We illustrate a fuzzy technique to evaluate the security level for a given policy against a set of reference policy levels.</abstract><cop>Las Alamitos CA</cop><pub>IEEE</pub><doi>10.1109/ITCC.2004.1286747</doi></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 0769521088 |
ispartof | International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, 2004, Vol.2, p.752-756 Vol.2 |
issn | |
language | eng |
recordid | cdi_pascalfrancis_primary_17458926 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Applied sciences Computer science control theory systems Data engineering Data security Digital signatures Exact sciences and technology Information security Interconnected systems Law Legal factors Public key Standards organizations Uncertainty |
title | Security level evaluation: policy and fuzzy techniques |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T19%3A22%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20level%20evaluation:%20policy%20and%20fuzzy%20techniques&rft.btitle=International%20Conference%20on%20Information%20Technology:%20Coding%20and%20Computing,%202004.%20Proceedings.%20ITCC%202004&rft.au=Casola,%20V.&rft.date=2004&rft.volume=2&rft.spage=752&rft.epage=756%20Vol.2&rft.pages=752-756%20Vol.2&rft.isbn=0769521088&rft.isbn_list=9780769521084&rft_id=info:doi/10.1109/ITCC.2004.1286747&rft_dat=%3Cpascalfrancis_6IE%3E17458926%3C/pascalfrancis_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1286747&rfr_iscdi=true |