Sciweavers

407 search results - page 9 / 82
» An Ontology-based Approach to the Formalization of Informati...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
13 years 2 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
DANCE
2002
IEEE
14 years 9 days ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
IM
2007
13 years 8 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
ASPLOS
2004
ACM
14 years 24 days ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
ICFEM
2007
Springer
14 years 1 months ago
Formal Engineering of XACML Access Control Policies in VDM++
We present a formal, tool-supported approach to the design and maintenance of access control policies expressed in the eXtensible Access Control Markup Language (XACML). Our aim is...
Jeremy Bryans, John S. Fitzgerald