Sciweavers

316 search results - page 26 / 64
» Where do security policies come from
Sort
View
ERSHOV
2009
Springer
13 years 5 months ago
From Dynamic to Static and Back: Riding the Roller Coaster of Information-Flow Control Research
Abstract. Historically, dynamic techniques are the pioneers of the area of information flow in the 70's. In their seminal work, Denning and Denning suggest a static alternativ...
Andrei Sabelfeld, Alejandro Russo
IFIP
2004
Springer
14 years 29 days ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci
CCS
2007
ACM
14 years 1 months ago
Split-ballot voting: everlasting privacy with distributed trust
In this paper we propose a new voting protocol with desirable security properties. The voting stage of the protocol can be performed by humans without computers; it provides every...
Tal Moran, Moni Naor
ACSAC
2009
IEEE
13 years 11 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
ICCSA
2009
Springer
14 years 2 months ago
MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NAT
Abstract. The design and management of firewall ACLs is a very hard and error-prone task. Part of this complexity comes from the fact that each firewall platform has its own low-le...
Sergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca