2006 IEEE Information Assurance Workshop
DOI: 10.1109/iaw.2006.1652089
|View full text |Cite
|
Sign up to set email alerts
|

Compound Identity Measure: A New Concept for Information Assurance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The results should lead to a strategy, and its execution, to fill the identified gaps, as well as to improve and expand the existing technologies and products. 6 …”
Section: Pbm Technology and Capabilities Evaluationmentioning
confidence: 97%
See 2 more Smart Citations
“…The results should lead to a strategy, and its execution, to fill the identified gaps, as well as to improve and expand the existing technologies and products. 6 …”
Section: Pbm Technology and Capabilities Evaluationmentioning
confidence: 97%
“…In the present example, it would be easier to add a meta-policy rule to the digital policies for the QoS. The rule will look at the security classification of the flow [6] and determine that the particular label switched path is not available for the flows in that security category. The scenario depicted in Figure 4 is harder to implement, partly because the topic has not been adequately researched within the GIG.…”
Section: Deconfliction Of Policy Actionsmentioning
confidence: 98%
See 1 more Smart Citation
“…The PMI can be visualised as a backbone from which one can hang individual PBM applications, as is schematically illustrated in Figure 5. Examples of the PBM applications that can hang from a PMI include the routing management, quality of service management (Choudhary, 2004b), service level specifications management, information assurance management (Choudhary, 2005b(Choudhary, , 2006, and of course the network management (Choudhary, 2004a). This process is roughly like having a network backbone from which individual local area networks can be hanged.…”
Section: Pmi Based Deploymentmentioning
confidence: 99%
“…Recent work [8,9] on policy-based management [23] and the NSA's RAdAC (Risk Adaptable Access Control) [17] model have demonstrated that evaluation of dynamic policies is feasible and desirable. This is a powerful mechanism, closely related to Arachne.…”
Section: Related Workmentioning
confidence: 99%