Sciweavers

195 search results - page 2 / 39
» Composable Encapsulation Policies
Sort
View
ESORICS
2003
Springer
13 years 11 months ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ESORICS
2004
Springer
13 years 11 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
PLDI
2005
ACM
13 years 11 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
CCS
2009
ACM
14 years 6 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
WSC
2004
13 years 7 months ago
Using XML and BOMs to Rapidly Compose Simulations and Simulation Environments
This paper explores the application of Base Object Models (BOMs), an emerging XML standard, for rapidly composing simulations and simulation environments. We examine how pattern c...
Paul Gustavson, Tram Chase