Elsevier

Computers & Security

Volume 2, Issue 3, November 1983, Pages 256-260
Computers & Security

Selection process for security packages

https://doi.org/10.1016/0167-4048(83)90009-3Get rights and content

Abstract

The primary goal of this paper is to provide a simplified process which can be used for the selection of a security package. The material has been made specifically non-technical so that it can be used by persons with little technical background. The process is based on a formula, which, after application, results in a single measure by weighing the security features in a package against the requirements as set by management.

References (4)

  • IBM

    Resource access control facility RACF' SC28.0734-2

    OS/VS2 MVS Installation Reference Manual

    (1978)
  • ACF2

    ‘Planning guide and general information Manual’ Release 2.2

    (May 1979)
There are more references available in the full text version of this article.

Cited by (6)

  • Computer security policy: Important issues

    1988, Computers and Security
  • Towards optimized security-aware (O-Sec) VM placement algorithms

    2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy
  • Systematic security analysis for service-oriented software architectures

    2007, Proceedings - ICEBE 2007: IEEE International Conference on e-Business Engineering - Workshops: SOAIC 2007; SOSE 2007; SOKM 2007
  • Properties for security measures of software products

    2007, Applied Mathematics and Information Sciences
  • Measurement framework for software privilege protection based on user interaction analysis

    2005, Proceedings - International Software Metrics Symposium

Jan H.P. Eloff received a B.Sc. (Computer Science) degree at the Rand Afrikaans University, Johannesburg, South Africa (1978). In 1979 he received an Honours degree and in 1980 an M.Sc. in Computer Science at the same university. His dissertation involved in-depth study of all the logical aspects of computer security and he delivered a paper on this work at the South African Computer Symposium held in October 1981. Part of this research was also presented at the International Data Security Workshop in February 1982 in Johannesburg.

Mr. Eloff is currently a lecturer in Computer Science and is completing his work for a Ph.D. He is also a consultant in the area of the logical aspects of computer security.

View full text