Sciweavers

979 search results - page 64 / 196
» Developing Dynamic Security Policies
Sort
View
CSFW
2005
IEEE
14 years 3 months ago
Achieving Information Flow Security through Precise Control of Effects
This paper advocates a novel approach to the construction of secure software: controlling information flow and maintaining integrity via monadic encapsulation of effects. This ap...
William L. Harrison, James Hook
DEXAW
1998
IEEE
122views Database» more  DEXAW 1998»
14 years 2 months ago
A Prototype Model for Data Warehouse Security Based on Metadata
The aim of this paper is to give an overview of security relevant aspects of existing OLAP/Data Warehouse solutions, an area which has seen rather little interest from product dev...
Nevana Katic, Gerald Quirchmayr, Josef Schiefer, M...
DGO
2003
140views Education» more  DGO 2003»
13 years 11 months ago
Social Welfare Program Administration and Evaluation and Policy Analysis Using Knowledge Discovery and Data Mining (KDD) on Admi
New technology in knowledge discovery and data mining (KDD) make it possible to extract valuable information from operational data. Private businesses already use the technology f...
Hye-Chung (Monica) Kum, Dean Duncan, Kimberly Flai...
USS
2008
14 years 9 days ago
An Empirical Security Study of the Native Code in the JDK
It is well known that the use of native methods in Java defeats Java's guarantees of safety and security, which is why the default policy of Java applets, for example, does n...
Gang Tan, Jason Croft
INFOCOM
2006
IEEE
14 years 4 months ago
Policy-Based Resource Management and Service Provisioning in GMPLS Networks
— Emerging network applications tend to be built over heterogeneous network resources spanning multiple management domains. Many such applications have dynamic demands for dedica...
Xi Yang, Tom Lehman, Chris Tracy, Jerry Sobieski, ...