Sciweavers

12 search results - page 1 / 3
» Experiences Validating the Access Policy Tool in Industrial ...
Sort
View
HICSS
2010
IEEE
155views Biometrics» more  HICSS 2010»
14 years 3 days ago
Experiences Validating the Access Policy Tool in Industrial Settings
—The Access Policy Tool (APT) analyzes the firewall configuration in an enterprise network for compliance with global access policy, e.g., such as describes the industry’s be...
David M. Nicol, William H. Sanders, Mouna Seri, Sa...
TKDE
2008
177views more  TKDE 2008»
13 years 5 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
ICSE
2012
IEEE-ACM
11 years 7 months ago
Industrial application of concolic testing approach: A case study on libexif by using CREST-BV and KLEE
—As smartphones become popular, manufacturers such as Samsung Electronics are developing smartphones with rich functionality such as a camera and photo editing quickly, which acc...
Yunho Kim, Moonzoo Kim, Young Joo Kim, Yoonkyu Jan...
ASWEC
2000
IEEE
13 years 9 months ago
Implementing an Experience Factory Based on Existing Organizational Knowledge
This paper describes the development of an experience factory in an Australian organization involved in the field of telecommunications. Faced with improvement needs, in 1998 the ...
Arne Koennecker, D. Ross Jeffery, Graham C. Low
SIGCOMM
2009
ACM
13 years 11 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...