Merging Security Policies: Analysis of a Practical Example
نویسندگان
چکیده
It often happens that organizations or companies have to respect several security policies simultaneously. Here, we analyze a practical example which applies to the context of documents containing sensitive information. This example considers the problem of downgrading the classification of these documents when their contents become obsolete. There are several security policies that deal with this problem and it appears that these security policies are conflicting. In this paper, we suggest a general approach to detect and solve the conflicts between the security policies and show how it applies to our practical example.
منابع مشابه
Merging DMUs Based on of the idea Inverse DEA
In this paper, we propose a novel method using multiple-objective programming problems to answer the following question: if among a group of decision making units (DMUs), a subset of DMUs are required to merge and form a new DMU with specific input/output levels and a predefined efficiency target, how much should be the outputs/inputs of the merged DMU? This question answered according to the c...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملMediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining different sensitivity levels over a common dataset and investigate its ramifications on information flow policies. Next, safe-flow policies are formulated in full generality using domain-theoretic tools, and systematically...
متن کاملAn Analysis of the Patterns of Policymaking in Iraq’s National Security During the Period of the Ba’ath Party’s Rule
Relying on its partisan principles and values, the Ba’athist regime– the period when Saddam Hussein was in charge in Iraq– sought a powerful government. Not respecting and believing in ethnical and sectarian differences and seeking the realization of national unity, Saddam tried to regulate security policies in a way in which he could assimilate the differing Iraqi society, using the policies o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998