Sciweavers

715 search results - page 8 / 143
» On Run-Time Enforcement of Policies
Sort
View
ESOP
2010
Springer
14 years 4 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
ESORICS
2002
Springer
14 years 7 months ago
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Abstract. An important goal of security in information systems is confidentiality. A confidentiality policy specifies which users should be forbidden to acquire what kind of inform...
Joachim Biskup, Piero A. Bonatti
GRID
2007
Springer
14 years 1 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey
VLDB
2004
ACM
138views Database» more  VLDB 2004»
14 years 25 days ago
Limiting Disclosure in Hippocratic Databases
We present a practical and efficient approach to incorporating privacy policy enforcement into an existing application and database environment, and we explore some of the semanti...
Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Ra...
COMPSAC
2008
IEEE
14 years 1 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands