Sciweavers

316 search results - page 8 / 64
» Where do security policies come from
Sort
View
EUROSYS
2008
ACM
14 years 4 months ago
Manageable fine-grained information flow
The continuing frequency and seriousness of security incidents underlines the importance of application security. Decentralized information flow control (DIFC), a promising tool ...
Petros Efstathopoulos, Eddie Kohler
CCO
2001
Springer
143views Combinatorics» more  CCO 2001»
14 years 4 days ago
TSP Cuts Which Do Not Conform to the Template Paradigm
Abstract. The first computer implementation of the Dantzig-FulkersonJohnson cutting-plane method for solving the traveling salesman problem, written by Martin, used subtour inequa...
David Applegate, Robert E. Bixby, Vasek Chvá...
ACISP
1997
Springer
13 years 11 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
CASSIS
2004
Springer
14 years 1 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
GIS
2010
ACM
13 years 5 months ago
Geolocation privacy and application platforms
Security and privacy issues for Location-Based Services (LBS) and geolocation-capable applications often revolve around designing a User Interface (UI) such that users are informe...
Nick Doty, Erik Wilde