Sciweavers

715 search results - page 36 / 143
» On Run-Time Enforcement of Policies
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
WPES
2004
ACM
14 years 3 months ago
Specifying privacy policies with P3P and EPAL: lessons learned
As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that d...
William H. Stufflebeam, Annie I. Antón, Qin...
SCP
2010
174views more  SCP 2010»
13 years 4 months ago
Aspects of availability: Enforcing timed properties to prevent denial of service
We propose a domain-specific aspect language to prevent denial of service caused by resource management. Our aspects specify availability policies by enforcing time limits in the ...
Pascal Fradet, Stéphane Hong Tuan Ha
CCS
2008
ACM
13 years 11 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
CSFW
2005
IEEE
14 years 3 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers