Sciweavers

1484 search results - page 21 / 297
» Security policies for downgrading
Sort
View
CCS
2007
ACM
14 years 1 months ago
Security policy analysis using deductive spreadsheets
Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan,...
IM
2007
13 years 8 months ago
CLID: A general approach to validate security policies in a dynamic network
- Many researchers have considered security policy management, including how to configure policies manually and even how to automatically generate security policies based on securi...
Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu
CCS
2007
ACM
14 years 1 months ago
Weaving rewrite-based access control policies
Anderson Santana de Oliveira, Eric Ke Wang, Claude...
ACSAC
2000
IEEE
13 years 11 months ago
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI)
V. Prasad, S. Potakamuri, M. Ahern, I. Balabine, M...
CCS
2006
ACM
13 years 11 months ago
Supporting location-based conditions in access control policies
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...