Sciweavers

715 search results - page 42 / 143
» On Run-Time Enforcement of Policies
Sort
View
SOUPS
2006
ACM
14 years 3 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat
ACSAC
2010
IEEE
13 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
NDSS
2006
IEEE
14 years 3 months ago
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
POLICY
2007
Springer
14 years 3 months ago
Infrastructure-Aware Autonomic Manager for Change Management
Typical IT Environments of medium to large size organizations consist of tens of networks that connect hundreds of servers to support the running of a large variety of business-re...
Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Moh...
ESORICS
2003
Springer
14 years 2 months ago
A Toolkit for Managing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. An enterprise privacy policy often ...
Michael Backes, Birgit Pfitzmann, Matthias Schunte...