Sciweavers

979 search results - page 61 / 196
» Developing Dynamic Security Policies
Sort
View
ACSAC
2001
IEEE
14 years 1 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner
CSFW
2003
IEEE
14 years 3 months ago
Using Access Control for Secure Information Flow in a Java-like Language
Access control mechanisms are widely used with the intent of enforcing confidentiality and other policies, but few formal connections have been made between information flow and...
Anindya Banerjee, David A. Naumann
EOR
2008
85views more  EOR 2008»
13 years 8 months ago
Asset and liability modelling for participating policies with guarantees
We study the problem of asset and liability management of participating insurance policies with guarantees. We develop a scenario optimization model for integrative asset and liab...
Andrea Consiglio, Flavio Cocco, Stavros A. Zenios
HOTOS
2003
IEEE
14 years 3 months ago
Cosy: Develop in User-Land, Run in Kernel-Mode
User applications that move a lot of data across the user-kernel boundary suffer from a serious performance penalty. We provide a framework, Compound System Calls (CoSy), to enhan...
Amit Purohit, Charles P. Wright, Joseph Spadavecch...
RE
2001
Springer
14 years 2 months ago
The Role of Policy and Stakeholder Privacy Values in Requirements Engineering
Diverse uses of information technology (IT) in organizations affect privacy. Developers of electronic commerce, database management, security mechanisms, telecommunication and col...
Annie I. Antón, Julia Brande Earp, Thomas A...