• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,574
Next 10 →

Enforceable Security Policies

by Fred B. Schneider
"... ..."
Abstract - Cited by 605 (11 self) - Add to MetaCart
Abstract not found

Forecasting unstable policy enforcement

by Javier Baliosian, Ann Devitt - In Proceedings of the IEEE Internation Conference on Systems and Networks Communications, Tahiti, French Polynesia , 2006
"... Abstract — Policy-based network management (PBNM) is a promising but not yet delivering discipline aimed at automating network management decisions based on expert knowledge and strategic business objectives. One of the issues which is almost not being addressed in PBNM is the stability of the manag ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
of enforcing a given policy improving system stability. I.

Policy Enforcement for the Web of Data

by Truc-vien T. Nguyen, Nicoletta Fornara
"... Abstract. Collecting data from the web is essential for research in social science, like digital marketing and applied economics, and for data research areas like Information Retrieval and Big Data. How-ever, most of current methods for automatically collecting web data do not take into account prin ..."
Abstract - Add to MetaCart
principles of data protection policies. There-fore, it is crucial to realize a method that complies with legal, ethical, and license policies established by governments and associations. In this paper, we present a general framework for automatically collect-ing data from social networks which is able

Security Policy Enforcement

by Cynthia E. Irvine , 2005
"... ..."
Abstract - Add to MetaCart
Abstract not found

Policy enforcement via program monitoring

by Jarred Adam Ligatti , 2006
"... One way to guarantee that software behaves securely is to monitor programs at run time and check that they dynamically adhere to constraints specified by a security policy. Whenever a program monitor detects that untrusted software is attempting to execute a dangerous action, it takes remedial steps ..."
Abstract - Cited by 21 (2 self) - Add to MetaCart
steps to ensure that only safe code actually gets executed. This thesis considers the space of policies enforceable by monitoring the run-time behaviors of programs and develops a practical language for specifying monitors ’ policies. In order to delineate the space of policies that monitors can enforce

Policy Enforcement in Stub Autonomous Domains

by Gene Tsudik , 1992
"... Interconnection across administrative boundaries prompts the need for comprehensive policy enforcement (i.e., access control) with respect to inter-domain packet traffic. Due to the nature of the communication services they provide, stub and transit domains require different mechanisms for policing ..."
Abstract - Add to MetaCart
Interconnection across administrative boundaries prompts the need for comprehensive policy enforcement (i.e., access control) with respect to inter-domain packet traffic. Due to the nature of the communication services they provide, stub and transit domains require different mechanisms for policing

Security Policy Enforcement in the Antigone System

by Patrick McDaniel, Atul Prakash , 2005
"... Works in communication security policy have recently focused on general-purpose policy languages and evaluation algorithms. However, because the supporting frameworks often defer enforcement, the correctness of a realization of these policies in software is limited by the quality of domain-specif ..."
Abstract - Add to MetaCart
Works in communication security policy have recently focused on general-purpose policy languages and evaluation algorithms. However, because the supporting frameworks often defer enforcement, the correctness of a realization of these policies in software is limited by the quality of domain

Infrastructure Support for Predictable Policy Enforcement

by Gary J Vecellio , William M Thomas - Proceedings of the Sixth ICSE Workshop on Component-Based Software Engineering , 2003
"... ABSTRACT Component and service-based application infrastructures provide mechanisms for efficiently composing a system from a diverse collection of components and services. However, because of the lack of insight into the components and services within the application, integrating changes can be ch ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
how these patterns can be mapped to commercially available infrastructures. By realizing these patterns as common infrastructure extensions, we allow applications to be developed in a manner consistent with the commercial infrastructure, provide the power of policy enforcement mechanisms to the system

Towards automated authorization policy enforcement

by Vinod Ganapathy, Trent Jaeger, Somesh Jha - In Proceedings of Second Annual Security Enhanced Linux Symposium , 2006
"... In systems with shared resources, authorization pol-icy enforcement ensures that these resources are acces-sible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating sys-tem, and (ii) enable us ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
In systems with shared resources, authorization pol-icy enforcement ensures that these resources are acces-sible only to users who are allowed to do so. Recently, there is growing interest to (i) extend authorization policy enforcement mechanisms provided by the operating sys-tem, and (ii) enable

Towards Practical Privacy Policy Enforcement

by William H. Winsborough, Jeffery Von Ronne, Omar Chowdhury, Jianwei Niu, Md. Shamim Ashik
"... Organizations that use private information typically must provide assurances to regulators that their practices ensure that regulations are met. However, to the extent that they rely on electronic information systems for the management of private information, they really have no basis for providing ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
those assurances. This paper proposes a framework for the design and implementation of information systems that provably enforce privacy policies. The privacy policies we aim to enforce are expressed in first-order temporal logic (FOTL). They capture not only safety, but also liveness requirements
Next 10 →
Results 1 - 10 of 6,574
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University