Sciweavers

3605 search results - page 76 / 721
» Securing Security Policies in Autonomic Computing Systems
Sort
View
JCS
2008
124views more  JCS 2008»
13 years 8 months ago
Securing information flow via dynamic capture of dependencies
Although static systems for information flow security are well-studied, few works address runtime information flow monitoring. Runtime information flow control offers distinct adv...
Paritosh Shroff, Scott F. Smith, Mark Thober
ESORICS
2003
Springer
14 years 1 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
IPPS
2007
IEEE
14 years 2 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy speciļ¬cations. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
CSFW
2005
IEEE
14 years 1 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information ļ¬‚ow analysis for the speciļ¬cation and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
CSFW
2011
IEEE
12 years 7 months ago
Dynamic Enforcement of Knowledge-Based Security Policies
ā€”This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querierā€™s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...