Sciweavers

715 search results - page 44 / 143
» On Run-Time Enforcement of Policies
Sort
View
DMS
2010
147views Multimedia» more  DMS 2010»
13 years 7 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
PERCOM
2006
ACM
14 years 8 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell
CSFW
2004
IEEE
14 years 23 days ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
JHSN
2006
95views more  JHSN 2006»
13 years 9 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
14 years 10 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...