Sciweavers

451 search results - page 11 / 91
» What Is a Conversation Policy
Sort
View
EGCDMAS
2004
147views ECommerce» more  EGCDMAS 2004»
15 years 5 months ago
Should We Prove Security Policies Correct?
Security policies are abstract descriptions of how a system should behave to be secure. They typically express what is obligatory, permitted, or forbidden in the system. When the s...
Sebastiano Battiato, Giampaolo Bella, Salvatore Ri...
COMPSAC
2007
IEEE
15 years 8 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
143
Voted
WWW
2005
ACM
16 years 4 months ago
Improving understanding of website privacy policies with fine-grained policy anchors
Website privacy policies state the ways that a site will use personal identifiable information (PII) that is collected from fields and forms in web-based transactions. Since these...
Stephen E. Levy, Carl Gutwin
SACMAT
2005
ACM
15 years 9 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
162
Voted
CSCW
2011
ACM
14 years 11 months ago
Research team integration: what it is and why it matters
Science policy across the world emphasizes the desirability of research teams that can integrate diverse perspectives and expertise into new knowledge, methods, and products. Howe...
Aruna D. Balakrishnan, Sara B. Kiesler, Jonathon N...