Sciweavers

294 search results - page 14 / 59
» Conflict Analysis for Management Policies
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu
WSC
2007
13 years 10 months ago
An initial simulation model for aiding policy analysis in urban insurgencies
This paper aims to demonstrate the potential for using the system dynamics computer simulation methodology to gain insight into the evolution of insurgencies. In particular, it ex...
Edward G. Anderson Jr.
TISSEC
2010
142views more  TISSEC 2010»
13 years 2 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...
CN
2004
63views more  CN 2004»
13 years 7 months ago
Policy-enabled mechanisms for feature interactions: reality, expectations, challenges
: This paper is based on the discussion during a panel that took place at the 7th Workshop on Feature Interactions in Telecommunications and Software Systems in Ottawa, Canada, Jun...
Petre Dini, Alexander Clemm, Tom Gray, Fuchun Jose...
COLCOM
2009
IEEE
14 years 17 days ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...