Comparing Access Control Security Policies : A Case Study Using SBVR
Companies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
KTH, Skolan för informations- och kommunikationsteknik (ICT)
2012
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306 |
id |
ndltd-UPSALLA1-oai-DiVA.org-kth-108306 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-kth-1083062013-01-08T13:46:01ZComparing Access Control Security Policies : A Case Study Using SBVRengGraisithikul, GunyaratKTH, Skolan för informations- och kommunikationsteknik (ICT)2012SBVRbusiness vocabularybusiness rulesaccess controlsecurity policycomparingTECHNOLOGYTEKNIKVETENSKAPCompanies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has been raised. Can a comparison of two access control policies made through Semantic of Business Vocabulary and Business Rules (SBVR) be more appropriate than the traditional way of intuitively comparing two information security policies? In this research, a case study has been conducted along with the questionnaires as a data collection approach. In the case study, a calculation for a degree of policy statement similarity of Company A’s and Company B has been done. Both calculations were based on the questionnaire results of the Company A and Company B in form of SBVR and traditional policy statements separately. This research has revealed that SBVR applied policy is more appropriate for comparing two company policies than a traditional written policy. By applying SBVR to the policy statements, Company A and Company B had their policy in the same structure, which is in the SBVR format. They could get a very clear similar part of the policy statements (70% calculated by the results of the second questionnaire in this case study) agreed by both companies. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306Trita-ICT-EX ; 2012:278application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
SBVR business vocabulary business rules access control security policy comparing TECHNOLOGY TEKNIKVETENSKAP |
spellingShingle |
SBVR business vocabulary business rules access control security policy comparing TECHNOLOGY TEKNIKVETENSKAP Graisithikul, Gunyarat Comparing Access Control Security Policies : A Case Study Using SBVR |
description |
Companies today are required more and more to interconnect their information systems with partners and suppliers in order to be competitive in a global marketplace. A problem of how to compare a security policy between two different companies when they need to agree upon a single security policy has been raised. Can a comparison of two access control policies made through Semantic of Business Vocabulary and Business Rules (SBVR) be more appropriate than the traditional way of intuitively comparing two information security policies? In this research, a case study has been conducted along with the questionnaires as a data collection approach. In the case study, a calculation for a degree of policy statement similarity of Company A’s and Company B has been done. Both calculations were based on the questionnaire results of the Company A and Company B in form of SBVR and traditional policy statements separately. This research has revealed that SBVR applied policy is more appropriate for comparing two company policies than a traditional written policy. By applying SBVR to the policy statements, Company A and Company B had their policy in the same structure, which is in the SBVR format. They could get a very clear similar part of the policy statements (70% calculated by the results of the second questionnaire in this case study) agreed by both companies. |
author |
Graisithikul, Gunyarat |
author_facet |
Graisithikul, Gunyarat |
author_sort |
Graisithikul, Gunyarat |
title |
Comparing Access Control Security Policies : A Case Study Using SBVR |
title_short |
Comparing Access Control Security Policies : A Case Study Using SBVR |
title_full |
Comparing Access Control Security Policies : A Case Study Using SBVR |
title_fullStr |
Comparing Access Control Security Policies : A Case Study Using SBVR |
title_full_unstemmed |
Comparing Access Control Security Policies : A Case Study Using SBVR |
title_sort |
comparing access control security policies : a case study using sbvr |
publisher |
KTH, Skolan för informations- och kommunikationsteknik (ICT) |
publishDate |
2012 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108306 |
work_keys_str_mv |
AT graisithikulgunyarat comparingaccesscontrolsecuritypoliciesacasestudyusingsbvr |
_version_ |
1716528577238794240 |