We present a discretionary access control framework that can be used to control a principal’s ability to link information from two or more audit records and compromise a user’...
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which pr...