O'Reilly logo

Strategic Intelligence Management by Simeon Yates, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13

A Semantic Approach to Security Policy Reasoning

Ivan Launders and Simon Polovina

Introduction

The automation of business transactions across the Internet has brought about many benefits. As such, enterprises and individuals enjoy the provision of many goods and services that hitherto were inaccessible to them. This success has relied on the use of payment cards instead of cash, as these cards enable instant electronic transfer directly between supplier and customer including remotely across the Internet. However, as Schreft (2007) identified, these systems are information-dependent transactions and extend across checks, credit cards, and debit cards. As a consequence, this information, that is, the identity details of the participants ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required