Sciweavers

3605 search results - page 33 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
ICTCS
2005
Springer
14 years 1 months ago
Checking Risky Events Is Enough for Local Policies
Abstract. An extension of the λ-calculus is proposed to study historybased access control. It allows for parametrized security policies with a possibly nested, local scope. To gov...
Massimo Bartoletti, Pierpaolo Degano, Gian Luigi F...
ACSAC
2003
IEEE
14 years 1 months ago
Goalkeeper: Close-In Interface Protection
This paper discusses a potential security issue in common operating system and application environments regarding dynamically attached devices and device interfaces. A set of coun...
Stephen D. Wolthusen
ISCC
2005
IEEE
14 years 1 months ago
Trie-Based Policy Representations for Network Firewalls
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
Errin W. Fulp, Stephen J. Tarsa
CHIMIT
2007
ACM
13 years 11 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
DRM
2008
Springer
13 years 9 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...