Results 1 - 10
of
4,465
The Ponder Policy Specification Language
- LECTURE NOTES IN COMPUTER SCIENCE
, 2001
"... The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management ..."
Abstract
-
Cited by 499 (28 self)
- Add to MetaCart
The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered conditionaction rules for policy based management
Law and finance
- Journal of Political Economy
, 1998
"... This paper examines legal rules covering protection of corporate shareholders and creditors, the origin of these rules, and the qual-ity of their enforcement in 49 countries. The results show that common-law countries generally have the strongest, and French-civil-law countries the weakest, legal pr ..."
Abstract
-
Cited by 1530 (21 self)
- Add to MetaCart
This paper examines legal rules covering protection of corporate shareholders and creditors, the origin of these rules, and the qual-ity of their enforcement in 49 countries. The results show that common-law countries generally have the strongest, and French-civil-law countries the weakest, legal
An intrusion-detection model
- IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
, 1987
"... A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of sy ..."
Abstract
-
Cited by 639 (0 self)
- Add to MetaCart
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns
Test generation for network security rules
- In TestCom 2006, volume 3964 of LNCS
, 2006
"... Abstract. Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Although this is a kind of conformance testing, there are a number of significant differences with the framework of such standards as IS9646. We propose a method to derive t ..."
Abstract
-
Cited by 11 (0 self)
- Add to MetaCart
Abstract. Checking that a security policy has been correctly deployed over a network is a key issue for system administrators. Although this is a kind of conformance testing, there are a number of significant differences with the framework of such standards as IS9646. We propose a method to derive
ABSTRACT A Formal Approach for Testing Security Rules
"... Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we pro ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
Nowadays, security policies are the key point of every modern infrastructure. The specification and the testing of such policies are the fundamental steps in the development of a secure system since any error in a set of rules is likely to harm the global security. To address both challenges, we
Social Security Rules and Marginal Tax Rates
- National Tax Journal
, 1992
"... ABSTRACT rity tax is equal to the statutory rate while The analysis in this paper shows how for other taxpayers the combined effect of ourrent social security benefit rules have the tax and the resulting benefits implies created a variety of social security net a very much lower net marginal tax rat ..."
Abstract
-
Cited by 46 (5 self)
- Add to MetaCart
ABSTRACT rity tax is equal to the statutory rate while The analysis in this paper shows how for other taxpayers the combined effect of ourrent social security benefit rules have the tax and the resulting benefits implies created a variety of social security net a very much lower net marginal tax
Security rules versus Security properties Mathieu Jaume
"... Abstract. There exist many approaches to specify and to define secu-rity policies. We present here a framework in which the basic components of security policies can be expressed, and we identify their role in the de-scription of a policy, of a system and of a secure system. In this setting, we form ..."
Abstract
- Add to MetaCart
formally describe two approaches to define policies, and we relate them: the rule-based approach consists of specifying the conditions un-der which an action is granted and, the property-based approach consists of specifying the security properties the policy aims to enforce. We also show how a policy can
How Social Security and Medicare Affect Retirement Behavior in a World of Incomplete Markets
- ECONOMETRICA
, 1997
"... This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor ..."
Abstract
-
Cited by 371 (11 self)
- Add to MetaCart
of particular details of the Social Security rules, whose incentive effects are especially strong for lower income individuals and those who do not have access to fairly priced loans, annuities, and health insurance.
Efficiency and Equity Aspects of Alternative Social Security Rules ∗
, 2004
"... This paper studies human capital formation, labor supply and retirement decisions associated with four alternative regimes of social security. We implement a theoretical model with overlapping generations of households and two different ability types within each generation. We find that with a given ..."
Abstract
-
Cited by 9 (4 self)
- Add to MetaCart
This paper studies human capital formation, labor supply and retirement decisions associated with four alternative regimes of social security. We implement a theoretical model with overlapping generations of households and two different ability types within each generation. We find that with a
I. Purpose/Scope HIPAA Security Rule Compliance Policy
"... (HIPAA) Security Rule 1, which identifies legal requirements for the protection of electronic health information for health care providers and related entities. The purpose of this policy is to establish the requirement that all UCSC entities subject to the HIPAA Security Rule must implement an iden ..."
Abstract
- Add to MetaCart
(HIPAA) Security Rule 1, which identifies legal requirements for the protection of electronic health information for health care providers and related entities. The purpose of this policy is to establish the requirement that all UCSC entities subject to the HIPAA Security Rule must implement
Results 1 - 10
of
4,465