Sciweavers

715 search results - page 105 / 143
» On Run-Time Enforcement of Policies
Sort
View
FOSSACS
2005
Springer
14 years 1 months ago
Bridging Language-Based and Process Calculi Security
Language-based and process calculi-based information security are well developed fields of computer security. Although these fields have much in common, it is somewhat surprising...
Riccardo Focardi, Sabina Rossi, Andrei Sabelfeld
IPTPS
2005
Springer
14 years 1 months ago
A Taxonomy of Rational Attacks
Abstract— For peer-to-peer services to be effective, participating nodes must cooperate, but in most scenarios a node represents a self-interested party and cooperation can neith...
Seth James Nielson, Scott A. Crosby, Dan S. Wallac...
MDM
2004
Springer
14 years 29 days ago
Enabling Context-Aware and Privacy-Conscious User Data Sharing
This paper provides detail on two key components of the Houdini framework under development at Bell Labs, that enable context-aware and privacy-conscious user data sharing appropr...
Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Pet...
WETICE
2003
IEEE
14 years 27 days ago
Automatic synthesis of coordinators for COTS group-ware applications: an example
The coordination of concurrent activities in collaborative environments is a very important and difficult task. Many approaches for the construction of large-scale flexible grou...
Paola Inverardi, Massimo Tivoli, Antonio Bucchiaro...
ICALP
2003
Springer
14 years 25 days ago
Secrecy in Untrusted Networks
We investigate the protection of migrating agents against the untrusted sites they traverse. The resulting calculus provides a formal framework to reason about protection policies ...
Michele Bugliesi, Silvia Crafa, Amela Prelic, Vlad...