Focusing on the generalization of concepts, functionality, and overall processes involved in the creation of a secure 'network of trusted data' , the IDS-RAM resides at a higher abstraction level than common architecture models of concrete software solutions do. The document provides an overview and dedicated architecture specifications.
Draft Version for 4.1.6 please review especially chapter 4.1.6.5 IDS USAGE CONTROL POLICIES AND POLICY CLASSES
Please give feedback to if we should describe the Policy Classes in more details
Draft Version for 4.1.6 please review especially chapter 4.1.6.5 IDS USAGE CONTROL POLICIES AND POLICY CLASSES Please give feedback to if we should describe the Policy Classes in more details