Sciweavers

136 search results - page 8 / 28
» Deriving Enforcement Mechanisms from Policies
Sort
View
SACMAT
2011
ACM
12 years 10 months ago
Anomaly discovery and resolution in web access control policies
The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effec...
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
AAMAS
2005
Springer
14 years 1 months ago
Towards Time Management Adaptability in Multi-agent Systems
Abstract. So far, the main focus of research on adaptability in multiagent systems (MASs) has been on the agents’ behavior, for example on developing new learning techniques and ...
Alexander Helleboogh, Tom Holvoet, Danny Weyns, Yo...
USS
2004
13 years 8 months ago
Design of the EROS Trusted Window System
Window systems are the primary mediator of user input and output in modern computing systems. They are also a commonly used interprocess communication mechanism. As a result, they...
Jonathan S. Shapiro, John Vanderburgh, Eric Northu...
ESOP
2010
Springer
13 years 10 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
LISA
2007
13 years 9 months ago
Inferring Higher Level Policies from Firewall Rules
Packet filtering firewall is one of the most important mechanisms used by corporations to enforce their security policy. Recent years have seen a lot of research in the area of ...
Alok Tongaonkar, Niranjan Inamdar, R. Sekar