Sciweavers

316 search results - page 11 / 64
» Where do security policies come from
Sort
View
ENVSOFT
2006
131views more  ENVSOFT 2006»
13 years 7 months ago
Hydrological models are so good, do we still need data?
Our ability to numerically model natural systems has progressed enormously over the last 10e20 years. During the last decade computational power has increased to the stage where w...
R. P. Silberstein
ESORICS
2005
Springer
14 years 1 months ago
On Obligations
Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the do...
Manuel Hilty, David A. Basin, Alexander Pretschner
ECOOPW
1999
Springer
13 years 12 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
POLICY
2004
Springer
14 years 1 months ago
A Decentralized Treatment of a Highly Distributed Chinese-Wall Policy
Access control (AC) technology has come a long way from its roots as the means for sharing resources between processes running on a single machine, to a mechanism for regulating t...
Naftaly H. Minsky
SOUPS
2006
ACM
14 years 1 months ago
An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench
Today organizations do not have good ways of linking their written privacy policies with the implementation of those policies. To assist organizations in addressing this issue, ou...
Carolyn Brodie, Clare-Marie Karat, John Karat