Sciweavers

294 search results - page 42 / 59
» Analyzing Consistency of Security Policies
Sort
View
HICSS
2007
IEEE
115views Biometrics» more  HICSS 2007»
14 years 1 months ago
Open Source Software Adoption in ASEAN Member Countries
This paper investigates the extent to which Open Source software is being adopted for web hosts within member countries of the Association of South East Asian Nations (ASEAN), and...
Joshua L. Mindel, Lik Mui, Sameer Verma
TACAS
2012
Springer
288views Algorithms» more  TACAS 2012»
12 years 2 months ago
Reduction-Based Formal Analysis of BGP Instances
Today’s Internet interdomain routing protocol, the Border Gateway Protocol (BGP), is increasingly complicated and fragile due to policy misconfigurations by individual autonomou...
Anduo Wang, Carolyn L. Talcott, Alexander J. T. Gu...
SIGCOMM
2009
ACM
14 years 1 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
ICFP
2003
ACM
14 years 7 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
JCS
1998
117views more  JCS 1998»
13 years 7 months ago
A Semantic-Based Transaction Processing Model for Multilevel Transactions
Multilevel transactions have been proposed for multilevel secure databases; in contrast to most proposals, such transactions allow users to read and write across multiple security...
Indrakshi Ray, Paul Ammann, Sushil Jajodia