Sciweavers

979 search results - page 18 / 196
» Developing Dynamic Security Policies
Sort
View
CIA
2006
Springer
14 years 1 months ago
Using Electronic Institutions to Secure Grid Environments
As the technical infrastructure to support Grid environments matures, attention must be focused on integrating such technical infrastructure with technologies to support more dynam...
Ronald Ashri, Terry R. Payne, Michael Luck, Mike S...
EOR
2008
109views more  EOR 2008»
13 years 10 months ago
A dynamic model for managing overlapped iterative product development
Intense competition in many industries impels firms to develop more products in less time. Overlapping of development activities is regarded as one of the most promising strategie...
Jun Lin, Kah Hin Chai, Yoke San Wong, Aarnout Brom...
ACSAC
2004
IEEE
14 years 1 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
SMC
2007
IEEE
14 years 4 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
ESORICS
2000
Springer
14 years 1 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud