Sciweavers

Share
37 search results - page 1 / 8
» Composing security policies with polymer
Sort
View
PLDI
2005
ACM
12 years 11 months ago
Composing security policies with polymer
We introduce a language and system that supports deļ¬nition and composition of complex run-time security policies for Java applications. Our policies are comprised of two sorts o...
Lujo Bauer, Jay Ligatti, David Walker
SACMAT
2005
ACM
12 years 11 months ago
Composing and combining policies under the policy machine
As a major component of any host, or network operating system, access control mechanisms come in a wide variety of forms, each with their individual attributes, functions, methods...
David F. Ferraiolo, Serban I. Gavrila, Vincent C. ...
ICDCIT
2005
Springer
12 years 11 months ago
Validation of Policy Integration Using Alloy
Abstract. Organizations typically have multiple security policies operating together in the same system. The integration of multiple policies might be needed to achieve the desired...
Manachai Toahchoodee, Indrakshi Ray
CCS
2009
ACM
13 years 6 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
ESORICS
2004
Springer
12 years 11 months ago
An Algebra for Composing Enterprise Privacy Policies
Abstract. Enterprise privacy enforcement allows enterprises to internally enforce a privacy policy that the enterprise has decided to comply to. To facilitate the compliance with d...
Michael Backes, Markus Dürmuth, Rainer Steinw...
books