Sciweavers

687 search results - page 86 / 138
» A Self-Policing Policy Language
Sort
View
CIKM
2000
Springer
14 years 1 months ago
A Framework for Modeling Buffer Replacement Strategies
An e ective bu er management system is crucial for any database management system. While much work has been expended to provide extensible data types,extensible query languages an...
Stéphane Bressan, Chong Leng Goh, Beng Chin...
IEEECIT
2010
IEEE
13 years 7 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
JLP
2011
94views more  JLP 2011»
13 years 4 months ago
Permission to speak: A logic for access control and conformance
Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
ESOP
2010
Springer
14 years 9 days ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
CCS
2008
ACM
13 years 11 months ago
Towards automatic reverse engineering of software security configurations
The specifications of an application's security configuration are crucial for understanding its security policies, which can be very helpful in security-related contexts such...
Rui Wang 0010, XiaoFeng Wang, Kehuan Zhang, Zhuowe...