Sciweavers

1484 search results - page 17 / 297
» Security policies for downgrading
Sort
View
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 7 months ago
Ciphertext Policy Attribute based Encryption with anonymous access policy
In Ciphertext Policy Attribute based Encryption scheme, the encryptor can fix the policy, who can decrypt the encrypted message. The policy can be formed with the help of attribut...
A. Balu, K. Kuppusamy
IMCS
2007
78views more  IMCS 2007»
13 years 7 months ago
Usable set-up of runtime security policies
Setting up runtime security policies as required for firewalls or as envisioned by policy languages for the Semantic Web is a difficult task, especially for lay users who have l...
Almut Herzog, Nahid Shahmehri
POPL
2012
ACM
12 years 2 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
ACSAC
2003
IEEE
14 years 19 days ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
HICSS
2010
IEEE
139views Biometrics» more  HICSS 2010»
13 years 4 months ago
Quality and Fairness of an Information Security Policy As Antecedents of Employees' Security Engagement in the Workplace: An Emp
This paper investigates the impact of the characteristics of information security policy (ISP) on an employee's security compliance in the workplace. Two factors were propose...
Burcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat