Sciweavers

2422 search results - page 46 / 485
» Security Policy Consistency
Sort
View
ACSAC
2006
IEEE
14 years 2 months ago
Detecting Policy Violations through Traffic Analysis
Restrictions are commonly placed on the permitted uses of network protocols in the interests of security. These restrictions can sometimes be difficult to enforce. As an example, ...
Jeffrey Horton, Reihaneh Safavi-Naini
CN
2000
76views more  CN 2000»
13 years 10 months ago
Supporting reconfigurable security policies for mobile programs
Programming models that support code migration have gained prominence, mainly due to a widespread shift from stand-alone to distributed applications. Although appealing in terms o...
Brant Hashii, Scott Malabarba, Raju Pandey, Matt B...
POLICY
2007
Springer
14 years 4 months ago
Web Services Security: Challenges and Techniques
Web Services based computing is currently an important driver for the software industry. While several standards bodies (such as W3C and OASIS) are laying the foundation for Web S...
Anoop Singhal
COMPSAC
2000
IEEE
14 years 3 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
CIA
1997
Springer
14 years 2 months ago
Multi-Level Security in Multiagent Systems
Abstract. Whenever agents deal with con dential information, it is important that they comply with a principled security policy. We show how the database concept of multi-level sec...
Gerd Wagner