Sciweavers

2422 search results - page 112 / 485
» Security Policy Consistency
Sort
View
FIS
2010
15 years 4 months ago
A Provenance-Based Compliance Framework
Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it shoul...
Rocío Aldeco-Pérez, Luc Moreau
QSIC
2007
IEEE
15 years 11 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
15 years 9 months ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speciļ...
William R. Marczak, Shan Shan Huang, Martin Braven...
136
Voted
MIDDLEWARE
2004
Springer
15 years 10 months ago
On the benefits of decomposing policy engines into components
In order for middleware systems to be adaptive, their properties and services need to support a wide variety of application-specific policies. However, application developers and ...
Konstantin Beznosov
152
Voted
ETRICS
2006
15 years 8 months ago
An Algebra for Enterprise Privacy Policies Closed Under Composition and Conjunction
To cope with the complex requirements imposed on the processing of privacy-sensitive data within enterprises, the use of automatic or semi-automatic tools is gradually becoming in...
Dominik Raub, Rainer Steinwandt