Sciweavers

979 search results - page 33 / 196
» Developing Dynamic Security Policies
Sort
View
ESORICS
2007
Springer
14 years 4 months ago
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
Abstract. From a security standpoint, it is preferable to implement least privilege network security policies in which only the bare minimum of TCP/UDP ports on internal hosts are ...
Paul Z. Kolano
ITCC
2005
IEEE
14 years 3 months ago
Formalisation and implementation of Access control models
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...
Mathieu Jaume, Charles Morisset
PET
2004
Springer
14 years 3 months ago
Language-Based Enforcement of Privacy Policies
Abstract. We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the prog...
Katia Hayati, Martín Abadi
IOR
2008
105views more  IOR 2008»
13 years 10 months ago
The Stochastic Knapsack Revisited: Switch-Over Policies and Dynamic Pricing
The stochastic knapsack has been used as a model in wide ranging applications from dynamic resource allocation to admission control in telecommunication. In recent years, a variat...
Grace Y. Lin, Yingdong Lu, David D. Yao
HICSS
2007
IEEE
93views Biometrics» more  HICSS 2007»
14 years 4 months ago
Using Systems Dynamics to Explore Effects of Counterterrorism Policy
This paper suggests that the effects of counterterrorism policy on Violent Non-State Actors can be explored via systems dynamics. Specifically, we create a descriptive model of th...
Tara Leweling, Otto Sieber