O'Reilly logo

Policy Technologies for Self-Managing Systems by Dinesh Verma, Jorge Lobo, Kang-Won Lee, Seraphin Calo, Dakshi Agrawal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8 Policy-Based Security Management

Security is a wide area, covering several aspects related to the operation of computer systems and networks. It deals with three basic aspects of computer systems operations: confidentiality, integrity, and availability.

Confidentiality is the requirement that a piece of information stored on a computer system, or a flow of information among computers on the network, be available only to users authorized to access that information or the flow. To preserve the confidentiality of information, computer systems and networks need to provide mechanisms for access control, authenticating the identity of entities accessing the network, and mechanisms for encrypting any information stored on computers or being ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required