Sciweavers

229 search results - page 10 / 46
» Language-Based Enforcement of Privacy Policies
Sort
View
SOCIALCOM
2010
13 years 5 months ago
The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition
Service composition is a new paradigm for efficient and cost-effective IT service provisioning over the network. To safely and effectively deploy composed services within an organi...
Wei Wei, Ting Yu
CCS
2009
ACM
14 years 8 months ago
Efficient IRM enforcement of history-based access control policies
Inlined Reference Monitor (IRM) is an established enforcement mechanism for history-based access control policies. IRM enforcement injects monitoring code into the binary of an un...
Fei Yan, Philip W. L. Fong
POLICY
2007
Springer
14 years 1 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell
CCS
2004
ACM
14 years 22 days ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
SP
1999
IEEE
126views Security Privacy» more  SP 1999»
13 years 11 months ago
Flexible Policy-Directed Code Safety
This work introduces a new approach to code safety. We present Naccio, a system architecture that allows a large class of safety policies to be expressed in a general and platform...
David Evans, Andrew Twyman