A long-standing problem in information security is how to specify and enforce expressive security policies that control information flow while also permitting information release...
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
This paper considers a coalition C of enterprises {E1,..., En}, which is to be governed by a coalition policy PC , and where each memberenterprise Ei has its own internal policy Pi...
The potentials of modern information technology can only be exploited, if the underlying infrastructure and the applied applications sufficiently take into account all aspects of ...
Jan Peters, Roland Rieke, Taufiq Rochaeli, Bjö...
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...