Sciweavers

118 search results - page 1 / 24
» Towards an Algebra for Security Policies
Sort
View
APN
2005
Springer
14 years 4 months ago
Towards an Algebra for Security Policies
Jonathan D. Pincus, Jeannette M. Wing
SACMAT
2004
ACM
14 years 4 months ago
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using ...
Joachim Biskup, Sandra Wortmann
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 5 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
DBSEC
2009
124views Database» more  DBSEC 2009»
14 years 7 days ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
CCS
2006
ACM
14 years 2 months ago
Beyond separation of duty: an algebra for specifying high-level security policies
A high-level security policy states an overall requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensi...
Ninghui Li, Qihua Wang