Sciweavers

1484 search results - page 22 / 297
» Security policies for downgrading
Sort
View
IANDC
2008
74views more  IANDC 2008»
13 years 7 months ago
Execution monitoring enforcement under memory-limitation constraints
Recently, attention has been given to formally characterize security policies that are enforceable by different kinds of security mechanisms. A very important research problem is ...
Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi
POLICY
2004
Springer
14 years 21 days ago
Security Policy Reconciliation in Distributed Computing Environments
A major hurdle in sharing resources between organizations is heterogeneity. Therefore, in order for two organizations to collaborate their policies have to be resolved. The proces...
Hao Wang, Somesh Jha, Miron Livny, Patrick Drew Mc...
IANDC
2007
94views more  IANDC 2007»
13 years 7 months ago
Mediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Guo-Qiang Zhang
IACR
2011
101views more  IACR 2011»
12 years 7 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
CSREASAM
2009
13 years 8 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov