Sciweavers

715 search results - page 14 / 143
» On Run-Time Enforcement of Policies
Sort
View
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ACSAC
2001
IEEE
13 years 11 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
CCS
2008
ACM
13 years 9 months ago
Enforcing authorization policies using transactional memory introspection
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded software. Even in carefully-reviewed code, unauthorized access may be possible in ...
Arnar Birgisson, Mohan Dhawan, Úlfar Erling...
POLICY
2007
Springer
14 years 1 months ago
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall
We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
Apu Kapadia, Prasad Naldurg, Roy H. Campbell