Sciweavers

715 search results - page 41 / 143
» On Run-Time Enforcement of Policies
Sort
View
SCM
2003
13 years 10 months ago
Dissecting Configuration Management Policies
A configuration management policy specifies the procedures through which a user evolves artifacts stored in a configuration management system. Different configuration management sy...
Ronald van der Lingen, André van der Hoek
CSE
2009
IEEE
14 years 3 months ago
A Hybrid Enforcement Model for Group-centric Secure Information Sharing
—Group-Centric Secure Information Sharing (g-SIS) is motivated by the need to dynamically share information amongst a set of authorized users for a specific purpose. Authorized ...
Ram Krishnan, Ravi S. Sandhu
DSN
2006
IEEE
14 years 3 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
14 years 2 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
ICPADS
2006
IEEE
14 years 3 months ago
Policy-Directed Data Movement in Grids
One of the guiding principles of the Grid is local (site) autonomy. Resource owners maintain control over their resources even when those resources are part of a larger Grid. In o...
Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Hum...