Sciweavers

1167 search results - page 20 / 234
» policy 2007
Sort
View
DGO
2007
140views Education» more  DGO 2007»
13 years 12 months ago
Governing with information technologies
This paper outlines the project highlights for the research project, Governing with Information Technologies. Categories and Subject Descriptors K.4.1 [Computers and Society]: Pub...
Rajiv C. Shah, Jay P. Kesan
ICSE
2007
IEEE-ACM
14 years 10 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
HICSS
2007
IEEE
104views Biometrics» more  HICSS 2007»
14 years 4 months ago
Employees' Behavior towards IS Security Policy Compliance
The literature agrees that the major threat to IS security is constituted by careless employees who do not comply with organizations’ IS security policies and procedures. To add...
Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood
DBSEC
2006
107views Database» more  DBSEC 2006»
13 years 11 months ago
From Business Process Choreography to Authorization Policies
Abstract. A choreography specifies the interactions between the resources of multiple collaborating parties at design time. The runtime management of authorization policies in orde...
Philip Robinson, Florian Kerschbaum, Andreas Schaa...
IANDC
2007
94views more  IANDC 2007»
13 years 10 months ago
Mediating secure information flow policies
In this paper we study secure information flow policies in the sense of Meadows [12] and others for aggregated datasets, collectively. We first present a method for combining di...
Guo-Qiang Zhang