Sciweavers

979 search results - page 59 / 196
» Developing Dynamic Security Policies
Sort
View
ACSAC
2007
IEEE
14 years 4 months ago
Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine
We have implemented an information flow framework for the Java Virtual Machine that combines static and dynamic techniques to capture not only explicit flows, but also implicit ...
Deepak Chandra, Michael Franz
EOR
2010
110views more  EOR 2010»
13 years 10 months ago
Online scheduling policies for multiclass call centers with impatient customers
We consider a call center with two classes of impatient customers: premium and regular classes. Modeling our call center as a multiclass GI/GI/s + M queue, we focus on developing ...
Oualid Jouini, Auke Pot, Ger Koole, Yves Dallery
ICSE
2005
IEEE-ACM
14 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ECIS
2004
13 years 11 months ago
Agile Security For Information Warfare: A Call For Research
The context of information security is changing dramatically. Networking technologies have driven the global expansion of electronic commerce. Electronic commerce is increasingly ...
Richard Baskerville
WSC
2008
14 years 8 days ago
Dynamic security: An agent-based model for airport defense
The Department of Homeland Security (DHS) shifted the focus of airport security in 2004 to incorporate the need to continuously and rapidly adapt security to shifting threats. MIT...
William E. Weiss