Sciweavers

1484 search results - page 25 / 297
» Security policies for downgrading
Sort
View
COMPSAC
2000
IEEE
14 years 25 days ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau
ESORICS
2008
Springer
13 years 10 months ago
Compositional Refinement of Policies in UML - Exemplified for Access Control
The UML is the de facto standard for system specification, but offers little specialized support for the specification and analysis of policies. This paper presents Deontic STAIRS,...
Bjørnar Solhaug, Ketil Stølen
ESOP
2010
Springer
14 years 5 months ago
Enforcing Stateful Authorization and Information Flow Policies in Fine
Proving software free of security bugs is hard. Languages that ensure that programs correctly enforce their security policies would help, but, to date, no security-typed language h...
Nikhil Swamy, Juan Chen and Ravi Chugh
SP
2010
IEEE
149views Security Privacy» more  SP 2010»
14 years 9 days ago
On the Incoherencies in Web Browser Access Control Policies
—Web browsers’ access control policies have evolved
Kapil Singh, Alexander Moshchuk, Helen J. Wang, We...
BPSC
2009
184views Business» more  BPSC 2009»
13 years 9 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen