Sciweavers

179 search results - page 10 / 36
» Security Policy Enforcement Through Refinement Process
Sort
View
POPL
2000
ACM
14 years 2 days ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
FOAL
2007
ACM
13 years 11 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
POLICY
2001
Springer
14 years 4 days ago
Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification
Specifying policies doesn’t occur in splendid isolation but as part of refining an enterprise specification. The roles, the tasks, and the business processes of an ODP community ...
James B. Cole, John Derrick, Zoran Milosevic, Kerr...
ACSAC
2006
IEEE
14 years 1 months ago
Shamon: A System for Distributed Mandatory Access Control
We define and demonstrate an approach to securing distributed computation based on a shared reference monitor (Shamon) that enforces mandatory access control (MAC) policies acros...
Jonathan M. McCune, Trent Jaeger, Stefan Berger, R...
FOSAD
2000
Springer
13 years 11 months ago
Access Control: Policies, Models, and Mechanisms
Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access co...
Pierangela Samarati, Sabrina De Capitani di Vimerc...