Messages, Communication, Information Security: Protecting the User from the Data
暂无分享,去创建一个
We present a way of analysing a socio-technical system (i.e. one which contains both human. and mechanical components) for a certain class of undesired characteristics including security breaches, privacy violations, errors being inserted into databases, and the like. We illustrate our approach by means of a case study involving communicating public administrations which we have been studying. We outline a number of options for constructing solution strategies to these problems.
[1] John E. Dobson,et al. Modelling real-world issues for dependable software , 1989 .
[2] Mike Martin,et al. Enterprise Modeling and Security Policies , 1990, DBSec.
[3] Alan Burns,et al. On the Meaning of Safety and Security , 1992, Comput. J..