Sciweavers

2422 search results - page 118 / 485
» Security Policy Consistency
Sort
View
NOMS
2006
IEEE
189views Communications» more  NOMS 2006»
15 years 10 months ago
Analysis of Firewall Policy Rules Using Data Mining Techniques
— Firewall is the de facto core technology of today's network security and defense. However, the management of firewall rules has been proven to be complex, error-prone, cos...
Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab...
GRID
2007
Springer
15 years 4 months ago
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS
In this paper, we present a role-based access control method for accessing databases through the Open Grid Services Architecture – Data Access and Integration (OGSA-DAI) framewor...
Anil L. Pereira, Vineela Muppavarapu, Soon M. Chun...
NDSS
2007
IEEE
15 years 11 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
DMS
2010
147views Multimedia» more  DMS 2010»
15 years 2 months ago
Towards Security-aware Program Visualization for Analyzing In-lined Reference Monitors
In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
Aditi Patwardhan, Kevin W. Hamlen, Kendra Cooper
ICISC
2007
105views Cryptology» more  ICISC 2007»
15 years 6 months ago
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments
Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the esta...
Jinwei Hu, Ruixuan Li, Zhengding Lu