Sciweavers

427 search results - page 46 / 86
» Policies: Giving Users Control over Calls
Sort
View
USENIX
2000
13 years 11 months ago
Pandora: A Flexible Network Monitoring Platform
This paper presents Pandora, a network monitoring platform that captures packets using purely passive techniques. Pandora addresses current needs for improving Internet middleware...
Simon Patarin, Mesaac Makpangou
CHI
2011
ACM
13 years 1 months ago
More than skin deep: measuring effects of the underlying model on access-control system usability
In access-control systems, policy rules conflict when they prescribe different decisions (ALLOW or DENY) for the same access. We present the results of a user study that demonstr...
Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor,...
ICDCSW
2005
IEEE
14 years 3 months ago
Zmail: Zero-Sum Free Market Control of Spam
The problem of spam is a classic “tragedy of the commons” [10]. We propose the Zmail protocol as a way to preserve email as a “free” common resource for most users, while ...
Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Moha...
ESORICS
2009
Springer
14 years 1 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
ICEIS
2009
IEEE
14 years 4 months ago
MIDAS: A Middleware for Information Systems with QoS Concerns
One of the most difficult tasks in the design of information systems is how to control the behaviour of the back-end storage engine, usually a relational database. As the load on t...
Luís Fernando Orleans, Geraldo Zimbrã...