Sciweavers

294 search results - page 18 / 59
» Analyzing Consistency of Security Policies
Sort
View
IJISEC
2007
149views more  IJISEC 2007»
13 years 7 months ago
Dynamic security labels and static information flow control
This paper presents a language in which information flow is securely controlled by a type system, yet the security class of data can vary dynamically. Information flow policies ...
Lantian Zheng, Andrew C. Myers
MSS
2008
IEEE
58views Hardware» more  MSS 2008»
13 years 7 months ago
Licensing of a quality-improving innovation
This paper considers the licensing of a quality-improving innovation. We analyze a duopoly model with heterogeneous firms and consumers. Firms compete in prices and face logit dem...
Giorgos Stamatopoulos, Yair Tauman
WORDS
2005
IEEE
14 years 27 days ago
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
This paper presents a framework for verifying the access control requirements of real-time application systems such as workflow management systems and active databases. The tempor...
Basit Shafiq, Ammar Masood, James Joshi, Arif Ghaf...
CSFW
2009
IEEE
14 years 2 months ago
Achieving Security Despite Compromise Using Zero-knowledge
One of the important challenges when designing and analyzing cryptographic protocols is the enforcement of security properties in the presence of compromised participants. This pa...
Michael Backes, Martin P. Grochulla, Catalin Hritc...
PDCAT
2004
Springer
14 years 20 days ago
A High-Level Policy Description Language for the Network ACL
Malicious codes and worms comprise the largest portion of the loss caused the security problem in the Internet. Small worms such as the “Blaster” spread quickly through the eno...
Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Se...