Sciweavers

40 search results - page 3 / 8
» Formal support for certificate management policies
Sort
View
TKDE
2008
177views more  TKDE 2008»
13 years 5 months ago
Analyzing and Managing Role-Based Access Control Policies
Today more and more security-relevant data is stored on computer systems; security-critical business processes are mapped to their digital counterparts. This situation applies to ...
Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, M...
CLEIEJ
2010
13 years 2 months ago
Implementation of an Improvement Cycle using the Competisoft Methodological Framework and the Tutelkan Platform
Formalizing and institutionalizing software processes has become a necessity in recent years requiring the management and enhancement of software production and, at the same time,...
Rodolfo Villarroel, Yessica Gómez, Roman Ga...
SIS
2008
13 years 6 months ago
Network Access Control Interoperation using Semantic Web Techniques
Network Access Control requirements are typically implemented in practice as a series of heterogeneous security-mechanism-centric policies that span system services and application...
William M. Fitzgerald, Simon N. Foley, Mích...
POLICY
2004
Springer
13 years 10 months ago
A Goal-based Approach to Policy Refinement
As the interest in using policy-based approaches for systems management grows, it is becoming increasingly important to develop methods for performing analysis and refinement of p...
Arosha K. Bandara, Emil Lupu, Jonathan D. Moffett,...
IDTRUST
2010
ACM
14 years 3 days ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith