Sciweavers

1484 search results - page 15 / 297
» Security policies for downgrading
Sort
View
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
13 years 8 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
DEXA
2003
Springer
134views Database» more  DEXA 2003»
14 years 17 days ago
Concurrent and Real-Time Update of Access Control Policies
Abstract. Access control policies are security policies that govern access to resources. Real-time update of access control policies, that is, updating policies while they are in e...
Indrakshi Ray, Tai Xin
POPL
2000
ACM
13 years 11 months ago
A Type System for Expressive Security Policies
Certified code is a general mechanism for enforcing security properties. In this paradigm, untrusted mobile code carries annotations that allow a host to verify its trustworthine...
David Walker
COMPSAC
2008
IEEE
14 years 1 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
IFIPTM
2010
204views Management» more  IFIPTM 2010»
13 years 5 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo