Sciweavers

451 search results - page 24 / 91
» What Is a Conversation Policy
Sort
View
APLAS
2011
ACM
12 years 11 months ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
POLICY
2009
Springer
14 years 5 months ago
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure
—Policy definition is an important component of the consistent authorisation service infrastructure that could be effectively integrated with the general resource provisioning wo...
Yuri Demchenko, Mihai Cristea, Cees de Laat
COMPSAC
2008
IEEE
14 years 5 months ago
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming
The lifecycle mismatch between vehicles and their IT system poses a problem for the automotive industry. Such systems need to be open and extensible to provide customised function...
Phu H. Phung, David Sands
SP
2008
IEEE
134views Security Privacy» more  SP 2008»
13 years 11 months ago
Expressive Declassification Policies and Modular Static Enforcement
This paper provides a way to specify expressive declassification policies, in particular, when, what, and where policies that include conditions under which downgrading is allowed...
Anindya Banerjee, David A. Naumann, Stan Rosenberg
CONCUR
2009
Springer
14 years 5 months ago
Flow Policy Awareness for Distributed Mobile Code
Several programming constructs have recently been proposed with the purpose of enabling the programmer to encode declassifying information flows within a program that complies wi...
Ana Almeida Matos