Sciweavers

2422 search results - page 82 / 485
» Security Policy Consistency
Sort
View
SIGPLAN
2008
15 years 4 months ago
Verified enforcement of stateful information release policies
Many organizations specify information release policies to describe the terms under which sensitive information may be released to other organizations. This paper presents a new a...
Nikhil Swamy, Michael Hicks
IMCS
2010
76views more  IMCS 2010»
15 years 2 months ago
Human-Related Problems of Information Security in East African Cross-Cultural Environments
Purpose – The purposes of this paper are to find what kinds of problems, while implementing information security policy, may take place in foreign companies in the East African ...
Tatsuo Asai, Ms. Aline Uwera Hakizabera
CHI
2010
ACM
15 years 11 months ago
Making policy decisions disappear into the user's workflow
: © Making Policy Decisions Disappear into the User's Workflow Alan H. Karp, Marc Stiegler HP Laboratories HPL-2009-341 Usable security Complaints of security interfering wit...
Alan H. Karp, Marc Stiegler
SP
1997
IEEE
126views Security Privacy» more  SP 1997»
15 years 8 months ago
Filtering Postures: Local Enforcement for Global Policies
When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to ensure that they will d...
Joshua D. Guttman
WWW
2007
ACM
16 years 5 months ago
Defeating script injection attacks with browser-enforced embedded policies
Web sites that accept and display content such as wiki articles or comments typically filter the content to prevent injected script code from running in browsers that view the sit...
Trevor Jim, Nikhil Swamy, Michael Hicks