{"title":"Requirements for a true enterprise-wide security infrastructure: the play's the thing","authors":"Doug Merrill, Alastair MacWillson, Gary Loveland","doi":"10.1109/RELDIS.1998.740531","DOIUrl":null,"url":null,"abstract":"Business has certain requirements that must be met if the enterprise is to thrive; some of these requirements are affected by security systems. The relationship of these requirements and supporting business has been well illustrated by the success of enterprise resource planning (ERP) systems and the initial failure and subsequent transformational impact of tools such as spreadsheets. If designed correctly, an enterprise-wide security infrastructure can, in fact, enable new business. However, the best security in the world will not be adequate if the business itself is not supported. This paper describes a set of minimum requirements that must be met if security systems are to meet their promise of enabling entirely new lines of business, and then describes an instantiation of these requirements in a currently available system.","PeriodicalId":376253,"journal":{"name":"Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems (Cat. No.98CB36281)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RELDIS.1998.740531","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Business has certain requirements that must be met if the enterprise is to thrive; some of these requirements are affected by security systems. The relationship of these requirements and supporting business has been well illustrated by the success of enterprise resource planning (ERP) systems and the initial failure and subsequent transformational impact of tools such as spreadsheets. If designed correctly, an enterprise-wide security infrastructure can, in fact, enable new business. However, the best security in the world will not be adequate if the business itself is not supported. This paper describes a set of minimum requirements that must be met if security systems are to meet their promise of enabling entirely new lines of business, and then describes an instantiation of these requirements in a currently available system.