To facilitate the sharing of information using modern communication networks, users must be able to decide on a privacy policy--what information to conceal, what to reveal, and to...
Network firewalls remain the forefront defense for most computer systems. These critical devices filter traffic by comparing arriving packets to a list of rules, or security po...
This paper introduces the Ponder language for specifying distributed object enterprise concepts. Ponder, is a declarative language, which permits the specification of policies in ...
Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemo...
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...