148 KB | 3 files | PDF
If properly envisaged and designed, access control can serve a more vital role in computing than one might expect.
Although access control (AC) currently plays an important role in securing data services (DS), if properly envisaged and designed, access control can serve a more vital role in computing than one might expect. The Policy Machine (PM), a framework for AC developed at NIST, was designed with this goal in mind. The PM has evolved beyond just a concept to a prototype implementation and is now being directed toward an open source project.
The attached zip file includes:
This publication is intended to assist organizations in understanding the basics of application whitelisting. It also explains planning and implementation for whitelisting technologies throughout the security deployment lifecycle. ... More >>
This publication assists organizations in understanding the basics of SSH interactive and automated access management in an enterprise, focusing on the management of SSH user keys. ... More >>
In this excerpt, Pooley focuses on managing your information assets, specifically looking at how to keep them safe, stay out of trouble, and maximize their utility in your business. ... More >>