Sciweavers

715 search results - page 47 / 143
» On Run-Time Enforcement of Policies
Sort
View
CSFW
2002
IEEE
14 years 2 months ago
A Privacy Policy Model for Enterprises
Privacy is an increasing concern in the marketplace. Although enterprises promise sound privacy practices to their customers, there is no technical mechanism to enforce them inter...
Günter Karjoth, Matthias Schunter
IFIP
2009
Springer
14 years 3 months ago
A Policy Model for Secure Information Flow
When a computer program requires legitimate access to confidential data, the question arises whether such a program may illegally reveal sensitive information. This paper proposes...
Adedayo Adetoye, Atta Badii
ESORICS
2006
Springer
14 years 20 days ago
Policy-Driven Memory Protection for Reconfigurable Hardware
Abstract. While processor based systems often enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reconfigurable har...
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ry...
CCS
2009
ACM
14 years 3 months ago
A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms
We enforce information flow policies in programs that run at multiple locations, with diverse levels of security. We build a compiler from a small imperative language with locali...
Cédric Fournet, Gurvan Le Guernic, Tamara R...
ESORICS
2007
Springer
14 years 3 months ago
A Policy Language for Distributed Usage Control
We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control requiremen...
Manuel Hilty, Alexander Pretschner, David A. Basin...