Sciweavers

1401 search results - page 58 / 281
» A Security Policy Model for Clinical Information Systems
Sort
View
IEEEIAS
2008
IEEE
14 years 3 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
POPL
1998
ACM
14 years 1 months ago
Secure Information Flow in a Multi-Threaded Imperative Language
Previously, we developed a type system to ensure secure information flow in a sequential, imperative programming language [VSI96]. Program variables are classified as either hig...
Geoffrey Smith, Dennis M. Volpano
CSFW
2010
IEEE
14 years 22 days ago
Information Flow Monitor Inlining
In recent years it has been shown that dynamic monitoring can be used to soundly enforce information flow policies. For programs distributed in source or bytecode form, the use o...
Andrey Chudnov, David A. Naumann
SACMAT
2004
ACM
14 years 2 months ago
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their ...
Nathan Dimmock, András Belokosztolszki, Dav...
WSC
2007
13 years 11 months ago
A hybrid inventory control system approach applied to the food industry
The appropriate production and inventory control policy is a key factor for modern enterprises’ success in competitive environment. In the food industry, most of food manufactur...
David Claudio, Jie Zhang, Ying Zhang