Sciweavers

233 search results - page 1 / 47
» Composing and combining policies under the policy machine
Sort
View
SACMAT
2005
ACM
13 years 10 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ESORICS
2004
Springer
13 years 9 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
PLDI
2005
ACM
13 years 10 months ago
Composing security policies with polymer
We introduce a language and system that supports definition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
BTW
2005
Springer
177views Database» more  BTW 2005»
13 years 10 months ago
Composing Web Services Specifications: Experiences in Implementing Policy-Driven Transactional Processes
: The Web Services architecture defines various specifications that applications may wish to use in combination. In this paper, we investigate the composition of the Web services s...
Stefan Tai