We propose and evaluate a novel framework for enforcing global coordination and control policies over interacting software components in enterprise computing environments. This fra...
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new a...
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...