• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,465
Next 10 →

The Ponder Policy Specification Language

by Nicodemos Damianou , Naranker Dulay , Emil Lupu , Morris Sloman - LECTURE NOTES IN COMPUTER SCIENCE , 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract - Cited by 499 (28 self) - Add to MetaCart
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management

Law and finance

by Rafael La Porta, Florencio Lopez-de-silanes, Andrei Shleifer, Robert W. Vishny, Bernard Black, Bertyl G. Bylund, Francesco Denozza, Yoshikata Fukui, Zvi Griliches, Oliver Hart, Martin Hellwig, James Hines, Louis Kaplow, Raghu Rajan, Roberta Romano, Rolf Skog, Eddy Wymeersch, Luigi Zingales - Journal of Political Economy , 1998
"... This paper examines legal rules covering protection of corporate shareholders and creditors, the origin of these rules, and the qual-ity of their enforcement in 49 countries. The results show that common-law countries generally have the strongest, and French-civil-law countries the weakest, legal pr ..."
Abstract - Cited by 1530 (21 self) - Add to MetaCart
This paper examines legal rules covering protection of corporate shareholders and creditors, the origin of these rules, and the qual-ity of their enforcement in 49 countries. The results show that common-law countries generally have the strongest, and French-civil-law countries the weakest, legal

An intrusion-detection model

by Dorothy E. Denning - IEEE TRANSACTIONS ON SOFTWARE ENGINEERING , 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract - Cited by 639 (0 self) - Add to MetaCart
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns

Test generation for network security rules

by Vianney Darmaillacq, Jean-claude Fern, Laurent Mounier, Jean-luc Richier - In TestCom 2006, volume 3964 of LNCS , 2006
"... Abstract. Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Although this is a kind of conformance testing, there are a number of significant differences with the framework of such standards as IS9646. We propose a method to derive t ..."
Abstract - Cited by 11 (0 self) - Add to MetaCart
Abstract. Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Although this is a kind of conformance testing, there are a number of significant differences with the framework of such standards as IS9646. We propose a method to derive

ABSTRACT A Formal Approach for Testing Security Rules

by Wissam Mallouli, Jean-marie Orset, Ana Cavalli
"... Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we pro ..."
Abstract - Cited by 13 (3 self) - Add to MetaCart
Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we

Social Security Rules and Marginal Tax Rates

by Martin Feldstein, Andrew Samwick - National Tax Journal , 1992
"... ABSTRACT rity tax is equal to the statutory rate while The analysis in this paper shows how for other taxpayers the combined effect of ourrent social security benefit rules have the tax and the resulting benefits implies created a variety of social security net a very much lower net marginal tax rat ..."
Abstract - Cited by 46 (5 self) - Add to MetaCart
ABSTRACT rity tax is equal to the statutory rate while The analysis in this paper shows how for other taxpayers the combined effect of ourrent social security benefit rules have the tax and the resulting benefits implies created a variety of social security net a very much lower net marginal tax

Security rules versus Security properties Mathieu Jaume

by Spi Lip, Marie Curie
"... Abstract. There exist many approaches to specify and to define secu-rity policies. We present here a framework in which the basic components of security policies can be expressed, and we identify their role in the de-scription of a policy, of a system and of a secure system. In this setting, we form ..."
Abstract - Add to MetaCart
formally describe two approaches to define policies, and we relate them: the rule-based approach consists of specifying the conditions un-der which an action is granted and, the property-based approach consists of specifying the security properties the policy aims to enforce. We also show how a policy can

How Social Security and Medicare Affect Retirement Behavior in a World of Incomplete Markets

by John Rust, Christopher Phelan - ECONOMETRICA , 1997
"... This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor ..."
Abstract - Cited by 371 (11 self) - Add to MetaCart
of particular details of the Social Security rules, whose incentive effects are especially strong for lower income individuals and those who do not have access to fairly priced loans, annuities, and health insurance.

Efficiency and Equity Aspects of Alternative Social Security Rules ∗

by Svend E. Hougaard Jensen, Morten I. Lau, Panu Poutvaara , 2004
"... This paper studies human capital formation, labor supply and retirement decisions associated with four alternative regimes of social security. We implement a theoretical model with overlapping generations of households and two different ability types within each generation. We find that with a given ..."
Abstract - Cited by 9 (4 self) - Add to MetaCart
This paper studies human capital formation, labor supply and retirement decisions associated with four alternative regimes of social security. We implement a theoretical model with overlapping generations of households and two different ability types within each generation. We find that with a

I. Purpose/Scope HIPAA Security Rule Compliance Policy

by Policy It, Uc Santa, Cruz Health, Insurance Portability, Accountability Act
"... (HIPAA) Security Rule 1, which identifies legal requirements for the protection of electronic health information for health care providers and related entities. The purpose of this policy is to establish the requirement that all UCSC entities subject to the HIPAA Security Rule must implement an iden ..."
Abstract - Add to MetaCart
(HIPAA) Security Rule 1, which identifies legal requirements for the protection of electronic health information for health care providers and related entities. The purpose of this policy is to establish the requirement that all UCSC entities subject to the HIPAA Security Rule must implement
Next 10 →
Results 1 - 10 of 4,465
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University