Sciweavers

524 search results - page 5 / 105
» Enforcing Messaging Security Policies
Sort
View
ESOP
2010
Springer
16 years 1 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
ESORICS
2000
Springer
15 years 8 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ACSAC
1999
IEEE
15 years 8 months ago
Policy-Based Management: Bridging the Gap
In a policy-based system, policy goals are described with respect to network entities (e.g., networks and users) instead of enforcement points (e.g., firewalls and routers). This ...
Susan Hinrichs
SP
2000
IEEE
15 years 8 months ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
POLICY
2005
Springer
15 years 9 months ago
Obligation Policies: An Enforcement Platform
The use of policy-based mechanisms significantly reduces the complexity associated with applicational development and operation. In particular, history-based policies allow the s...
Pedro Gama, Paulo Ferreira