Sciweavers

1484 search results - page 29 / 297
» Security policies for downgrading
Sort
View
HOTOS
2007
IEEE
14 years 9 days ago
End-to-End Web Application Security
Web applications are important, ubiquitous distributed systems whose current security relies primarily on server-side mechanisms. This paper makes the end-toend argument that the ...
Úlfar Erlingsson, V. Benjamin Livshits, Yin...
CSREASAM
2003
13 years 9 months ago
Security Policy Management for Handheld Devices
The adoption of wireless technologies and handheld devices is becoming widespread in business, industry, and government organizations. The use of handheld devices introduces new r...
Wayne A. Jansen, Tom Karygiannis, Michaela Iorga, ...
SP
2000
IEEE
14 years 24 days ago
IRM Enforcement of Java Stack Inspection
Two implementations are given for Java’s stack-inspection accesscontrol policy. Each implementation is obtained by generating an inlined reference monitor (IRM) for a different...
Úlfar Erlingsson, Fred B. Schneider
ESORICS
2003
Springer
14 years 1 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
CCS
2008
ACM
13 years 10 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...