Sciweavers

1484 search results - page 16 / 297
» Security policies for downgrading
Sort
View
JCS
2002
118views more  JCS 2002»
13 years 7 months ago
Verified Formal Security Models for Multiapplicative Smart Cards
We present two generic formal security models for operating systems of multiapplicative smart cards. The models formalize the main security aspects of secrecy, integrity, secure co...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...
ESORICS
2003
Springer
14 years 17 days ago
Flexible Regulation of Distributed Coalitions
This paper considers a coalition C of enterprises {E1,..., En}, which is to be governed by a coalition policy PC , and where each memberenterprise Ei has its own internal policy Pi...
Xuhui Ao, Naftaly H. Minsky
WISE
2009
Springer
14 years 4 months ago
Security Policy Definition Framework for SOA-Based Systems
This paper presents an extended architecture of a policy definition framework fine-tuned for service-oriented environments conforming to the SOA distributed processing paradigm. We...
Bartosz Brodecki, Piotr Sasak, Michal Szychowiak
CORR
2000
Springer
87views Education» more  CORR 2000»
13 years 7 months ago
Security Policy Consistency
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira, Pau...
ACSAC
1999
IEEE
13 years 11 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...