Sciweavers

224 search results - page 11 / 45
» A General Methodology For The Development Of An Effective In...
Sort
View
SACMAT
2009
ACM
14 years 2 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger
SIN
2010
ACM
13 years 5 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
WWW
2004
ACM
14 years 8 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
CCS
2009
ACM
14 years 8 months ago
Expressive policy analysis with enhanced system dynamicity
Despite several research studies, the effective analysis of policy based systems remains a significant challenge. Policy analysis should at least (i) be expressive (ii) take accou...
Robert Craven, Jorge Lobo, Jiefei Ma, Alessandra R...