Sciweavers

1627 search results - page 77 / 326
» On context in authorization policy
Sort
View
CCS
2004
ACM
14 years 3 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
IOR
2006
72views more  IOR 2006»
13 years 9 months ago
Inventory Policies in a Decentralized Assembly System
We consider a system in which a single finished good is assembled from two components. Demand for the finished product is stochastic and stationary, and procurement and assembly l...
Fernando Bernstein, Gregory A. DeCroix
ACSAC
2010
IEEE
13 years 7 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ICSE
2005
IEEE-ACM
14 years 9 months ago
Verifying safety policies with size properties and alias controls
Many software properties can be analysed through a relational size analysis on each function's inputs and outputs. Such relational analysis (through a form of dependent typin...
Wei-Ngan Chin, Siau-Cheng Khoo, Shengchao Qin, Cor...
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 4 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...