Sciweavers

294 search results - page 10 / 59
» Analyzing Consistency of Security Policies
Sort
View
MOBISYS
2011
ACM
12 years 9 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
CCS
2008
ACM
13 years 8 months ago
A formal framework for reflective database access control policies
Reflective Database Access Control (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an acce...
Lars E. Olson, Carl A. Gunter, P. Madhusudan
INTERACT
2007
13 years 8 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
14 years 1 months ago
Analyzing Enterprise Architecture in National Governments: The Cases of Denmark and the Netherlands
National enterprise architectures (NEA) promise to fill the gap between policy and implementation. NEAs are embedded within an institutional environment consisting of active playe...
Marijn Janssen, Kristian Hjort-Madsen
SACMAT
2009
ACM
14 years 1 months ago
Analysis of virtual machine system policies
The recent emergence of mandatory access (MAC) enforcement for virtual machine monitors (VMMs) presents an opportunity to enforce a security goal over all its virtual machines (VM...
Sandra Rueda, Hayawardh Vijayakumar, Trent Jaeger