Cart (Loading....) | Create Account
Close category search window
 

Notice of Violation of IEEE Publication Principles
A Formal Framework for Security Policy Specification and Implementation

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wang Yigong ; Henan Key Lab. of Inf. Security, Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China ; Zhang Hongqi ; Dai Xiangdong ; Liu Jiang

Notice of Violation of IEEE Publication Principles

"A Formal Framework for Security Policy Specification and Implementation"
by Wang Yigong, Zhang Hongqi, Dai Xiangdong, and Liu jiang
in the Proceedings of the 2011 International Conference on Network Computing and Information Security (NCIS'11), May 2011, pp. 253-256

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains substantial duplication of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original authors and/or paper titles) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:

"A Formal Approach to Implement Access Control"
by Mathieu Jaume and Charles Morisset
in the Journal of Information Assurance and Security, 2 (2006), pp. 59-70
and
"Towards a Formal Specification of Access Control"
by Mathieu Jaume and Charles Morisset
in the Proceedings of the 2006 Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'06)

In information systems, security policies are used to specify various security requirements, and the guarantee of these requirements can be obtained by implementing the security policies efficiently and consistently. Therefore, specification and implementation of security policies are of great importance to information system security. In this paper, we propose a formal security policy framework, allowing to specify diverse security policies, together with a description of implementation of security policies, which can enhance the efficiency and security of the information system. As - an example, we show how the proposed model can be used to specify and implement the Bell and LaPadula policies.

Published in:

Network Computing and Information Security (NCIS), 2011 International Conference on  (Volume:1 )

Date of Conference:

14-15 May 2011

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.