Sciweavers

2422 search results - page 119 / 485
» Security Policy Consistency
Sort
View
ENTCS
2007
199views more  ENTCS 2007»
15 years 4 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
SIGMOD
1997
ACM
85views Database» more  SIGMOD 1997»
15 years 8 months ago
Supporting Multiple View Maintenance Policies
Materialized views and view maintenance are becoming increasingly important in practice. In order to satisfy different data currency and performance requirements, a number of view...
Latha S. Colby, Akira Kawaguchi, Daniel F. Lieuwen...
CCS
2004
ACM
15 years 10 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell
RECOSOC
2007
115views Hardware» more  RECOSOC 2007»
15 years 6 months ago
Self-adaptive Security at Application Level: a Proposal
—Self-adaptive systems have the ability to adapt themselves to mutating external or internal conditions without requesting any intervention of the user; the security of such syst...
Alberto Ferrante, Antonio Vincenzo Taddeo, Mariagi...
CSREASAM
2006
15 years 6 months ago
Secure E-commerce Protection Profile
We present a Secure E-commerce Protection Profile (SEPP) that captures security requirements for securing sessions in the e-commerce operational environment. The SEPP is prepared ...
Anil Kumar Venkataiahgari, Mourad Debbabi, J. Will...