Sciweavers

316 search results - page 12 / 64
» Where do security policies come from
Sort
View
CODASPY
2012
12 years 3 months ago
Deriving implementation-level policies for usage control enforcement
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
Prachi Kumari, Alexander Pretschner
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...
GLOBECOM
2006
IEEE
14 years 1 months ago
A Distributed Policy Based Solution in a Fault Management Scenario
– The Madeira project, part of the Celtic Initiative1 , investigates the use of a fully distributed, policy-based network management framework that exploits the peer-to-peer para...
Ricardo Marin, Julio Vivero, Hai Nguyen, Joan Serr...
ACSAC
1999
IEEE
13 years 12 months ago
A Prototype Secure Workflow Server
Workflow systems provide automated support that enables organizations to efficiently and reliably move important data through their routine business processes. For some organizati...
Douglas L. Long, Julie Baker, Francis Fung
ICNS
2009
IEEE
14 years 2 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...