Sciweavers

2422 search results - page 26 / 485
» Security Policy Consistency
Sort
View
CSFW
2005
IEEE
14 years 4 months ago
Language-Based Information Erasure
Real computing systems sometimes need to forget sensitive information. This paper explores the specification and semantics of information erasure policies, which impose a strong,...
Stephen Chong, Andrew C. Myers
ACMSE
2006
ACM
14 years 4 months ago
Mobile-driven architecture for managing enterprise security policies
Authentication, access control, and audit (3As) are three fundamental mechanisms in enterprise security management for countering various types of looming threats from both inside...
William Claycomb, Dongwan Shin
CLEIEJ
2002
89views more  CLEIEJ 2002»
13 years 10 months ago
JaCoWeb Security - A CORBA Security Discretionary Prototype
This paper presents a CORBA Security discretionary prototype developed in the context of JaCoWeb Security Project. JaCoWeb Security Project is developing an authorization scheme f...
Carla Merkle Westphall, Joni da Silva Fraga, Miche...
ACSAC
2001
IEEE
14 years 2 months ago
Security Policy Enforcement at the File System Level in the Windows NT Operating System Family
This paper describes the implementation of an enforcement module for file system security implemented as part of a security architecture for distributed systems which enforces a c...
Stephen D. Wolthusen
AINA
2007
IEEE
14 years 5 months ago
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents
The Mobile Agent (MA) paradigm advocates the migration of agent code to achieve computational goals. MAs require an executable environment on hosts where mobile code can be execut...
Giovanni Russello, Changyu Dong, Naranker Dulay