Selection process for security packages
References (4)
Resource access control facility RACF' SC28.0734-2
OS/VS2 MVS Installation Reference Manual
(1978)‘Planning guide and general information Manual’ Release 2.2
(May 1979)
There are more references available in the full text version of this article.
Cited by (6)
Computer security policy: Important issues
1988, Computers and SecurityThe development of a specification language for a computer security system
1985, Computers and SecurityTowards optimized security-aware (O-Sec) VM placement algorithms
2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and PrivacySystematic security analysis for service-oriented software architectures
2007, Proceedings - ICEBE 2007: IEEE International Conference on e-Business Engineering - Workshops: SOAIC 2007; SOSE 2007; SOKM 2007Properties for security measures of software products
2007, Applied Mathematics and Information SciencesMeasurement framework for software privilege protection based on user interaction analysis
2005, Proceedings - International Software Metrics Symposium
- ∗
Jan H.P. Eloff received a B.Sc. (Computer Science) degree at the Rand Afrikaans University, Johannesburg, South Africa (1978). In 1979 he received an Honours degree and in 1980 an M.Sc. in Computer Science at the same university. His dissertation involved in-depth study of all the logical aspects of computer security and he delivered a paper on this work at the South African Computer Symposium held in October 1981. Part of this research was also presented at the International Data Security Workshop in February 1982 in Johannesburg.
Mr. Eloff is currently a lecturer in Computer Science and is completing his work for a Ph.D. He is also a consultant in the area of the logical aspects of computer security.
Copyright © 1983 Published by Elsevier Ltd.