With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Policy-based messaging (PBM) aims at carrying security policies with messages, which will be enforced at recipient systems to provide security features. PBM promotes a distributed...
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
This paper extends the work described in “An Approach to the Formalisation of a Certification Policy”, 7th International Symposium on System and Information Security (SSI 2005...