Sciweavers

2422 search results - page 70 / 485
» Security Policy Consistency
Sort
View
ISSA
2008
15 years 5 months ago
The Impact of Information Security Awareness Training on Information Security Behaviour: The Case for Further Research
Information Security awareness initiatives are seen as critical to any information security programme. But, how do we determine the effectiveness of these awareness initiatives? W...
Tony Stephanou, Rabelani Dagada
IADIS
2004
15 years 5 months ago
Web server authorisation with the policyupdater access control system
The PolicyUpdater1 system is a generic access control system that provides policy evaluations and dynamic policy updates. These functions are achieved by the use of a logic-based ...
Vino Fernando Crescini, Yan Zhang, Weiyuan Wang
DRM
2008
Springer
15 years 6 months ago
Enforcing DRM policies across applications
In this paper we present Trishul-UCON (T-UCON), a DRM system based on the UCONABC model. T-UCON is designed to be capable of enforcing not only application-specific policies, as a...
Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabrie...
114
Voted
CCS
2004
ACM
15 years 9 months ago
Verifying policy-based security for web services
WS-SecurityPolicy is a declarative configuration language for driving web services security mechanisms. We describe a formal sefor WS-SecurityPolicy, and propose a more abstract ...
Karthikeyan Bhargavan, Cédric Fournet, Andr...
DEON
2008
Springer
15 years 6 months ago
Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
The security policy of an information system may include a wide range of different requirements. The literature has primarily focused on access and information flow control require...
Nora Cuppens-Boulahia, Frédéric Cupp...