In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...