Results 1 - 10
of
6,574
Forecasting unstable policy enforcement
- In Proceedings of the IEEE Internation Conference on Systems and Networks Communications, Tahiti, French Polynesia
, 2006
"... Abstract — Policy-based network management (PBNM) is a promising but not yet delivering discipline aimed at automating network management decisions based on expert knowledge and strategic business objectives. One of the issues which is almost not being addressed in PBNM is the stability of the manag ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
of enforcing a given policy improving system stability. I.
Policy Enforcement for the Web of Data
"... Abstract. Collecting data from the web is essential for research in social science, like digital marketing and applied economics, and for data research areas like Information Retrieval and Big Data. How-ever, most of current methods for automatically collecting web data do not take into account prin ..."
Abstract
- Add to MetaCart
principles of data protection policies. There-fore, it is crucial to realize a method that complies with legal, ethical, and license policies established by governments and associations. In this paper, we present a general framework for automatically collect-ing data from social networks which is able
Policy enforcement via program monitoring
, 2006
"... One way to guarantee that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is attempting to execute a dangerous action, it takes remedial steps ..."
Abstract
-
Cited by 21 (2 self)
- Add to MetaCart
steps to ensure that only safe code actually gets executed. This thesis considers the space of policies enforceable by monitoring the run-time behaviors of programs and develops a practical language for specifying monitors ’ policies. In order to delineate the space of policies that monitors can enforce
Policy Enforcement in Stub Autonomous Domains
, 1992
"... Interconnection across administrative boundaries prompts the need for comprehensive policy enforcement (i.e., access control) with respect to inter-domain packet traffic. Due to the nature of the communication services they provide, stub and transit domains require different mechanisms for policing ..."
Abstract
- Add to MetaCart
Interconnection across administrative boundaries prompts the need for comprehensive policy enforcement (i.e., access control) with respect to inter-domain packet traffic. Due to the nature of the communication services they provide, stub and transit domains require different mechanisms for policing
Security Policy Enforcement in the Antigone System
, 2005
"... Works in communication security policy have recently focused on general-purpose policy languages and evaluation algorithms. However, because the supporting frameworks often defer enforcement, the correctness of a realization of these policies in software is limited by the quality of domain-specif ..."
Abstract
- Add to MetaCart
Works in communication security policy have recently focused on general-purpose policy languages and evaluation algorithms. However, because the supporting frameworks often defer enforcement, the correctness of a realization of these policies in software is limited by the quality of domain
Infrastructure Support for Predictable Policy Enforcement
- Proceedings of the Sixth ICSE Workshop on Component-Based Software Engineering
, 2003
"... ABSTRACT Component and service-based application infrastructures provide mechanisms for efficiently composing a system from a diverse collection of components and services. However, because of the lack of insight into the components and services within the application, integrating changes can be ch ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
how these patterns can be mapped to commercially available infrastructures. By realizing these patterns as common infrastructure extensions, we allow applications to be developed in a manner consistent with the commercial infrastructure, provide the power of policy enforcement mechanisms to the system
Towards automated authorization policy enforcement
- In Proceedings of Second Annual Security Enhanced Linux Symposium
, 2006
"... In systems with shared resources, authorization pol-icy enforcement ensures that these resources are acces-sible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating sys-tem, and (ii) enable us ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
In systems with shared resources, authorization pol-icy enforcement ensures that these resources are acces-sible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating sys-tem, and (ii) enable
Towards Practical Privacy Policy Enforcement
"... Organizations that use private information typically must provide assurances to regulators that their practices ensure that regulations are met. However, to the extent that they rely on electronic information systems for the management of private information, they really have no basis for providing ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
those assurances. This paper proposes a framework for the design and implementation of information systems that provably enforce privacy policies. The privacy policies we aim to enforce are expressed in first-order temporal logic (FOTL). They capture not only safety, but also liveness requirements
Results 1 - 10
of
6,574