Sciweavers

715 search results - page 29 / 143
» On Run-Time Enforcement of Policies
Sort
View
ACISP
1997
Springer
13 years 11 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
POLICY
2005
Springer
14 years 1 months ago
A RBAC-Based Policy Information Base
This paper presents a framework for representing and distributing access control policies in distributed heterogeneous systems. Access control polices follows the RBAC (Role Based...
Timothy E. Squair, Edgard Jamhour, Ricardo Nabhen
ESORICS
2010
Springer
13 years 8 months ago
A Theory of Runtime Enforcement, with Results
This paper presents a theory of runtime enforcement based on mechanism models called MRAs (Mandatory Results Automata). MRAs can monitor and transform security-relevant actions and...
Jay Ligatti, Srikar Reddy
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 2 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin
ERCIMDL
2004
Springer
116views Education» more  ERCIMDL 2004»
14 years 1 months ago
Towards a Policy Language for Humans and Computers
Abstract. A policy is a statement that an action is permitted or forbidden if certain conditions hold. We introduce a language for reasoning about policies called Rosetta. What mak...
Vicky Weissman, Carl Lagoze