This paper outlines the project highlights for the research project, Governing with Information Technologies. Categories and Subject Descriptors K.4.1 [Computers and Society]: Pub...
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...